CVE-2018-10853

A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2020:0036
https://access.redhat.com/errata/RHSA-2020:0103
https://access.redhat.com/errata/RHSA-2020:0179
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74 Patch Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://usn.ubuntu.com/3777-1/ Third Party Advisory
https://usn.ubuntu.com/3777-2/ Third Party Advisory
https://www.openwall.com/lists/oss-security/2018/09/02/1 Mailing List Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
https://access.redhat.com/errata/RHSA-2019:2029
https://access.redhat.com/errata/RHSA-2019:2043
https://access.redhat.com/errata/RHSA-2020:0036
https://access.redhat.com/errata/RHSA-2020:0103
https://access.redhat.com/errata/RHSA-2020:0179
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74 Patch Vendor Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6 Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html Mailing List Third Party Advisory
https://usn.ubuntu.com/3777-1/ Third Party Advisory
https://usn.ubuntu.com/3777-2/ Third Party Advisory
https://www.openwall.com/lists/oss-security/2018/09/02/1 Mailing List Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html - () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html -
References () https://access.redhat.com/errata/RHSA-2019:2029 - () https://access.redhat.com/errata/RHSA-2019:2029 -
References () https://access.redhat.com/errata/RHSA-2019:2043 - () https://access.redhat.com/errata/RHSA-2019:2043 -
References () https://access.redhat.com/errata/RHSA-2020:0036 - () https://access.redhat.com/errata/RHSA-2020:0036 -
References () https://access.redhat.com/errata/RHSA-2020:0103 - () https://access.redhat.com/errata/RHSA-2020:0103 -
References () https://access.redhat.com/errata/RHSA-2020:0179 - () https://access.redhat.com/errata/RHSA-2020:0179 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853 - Issue Tracking, Patch, Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74 - Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74 - Patch, Vendor Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6 - Patch, Vendor Advisory () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6 - Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html - Mailing List, Third Party Advisory
References () https://usn.ubuntu.com/3777-1/ - Third Party Advisory () https://usn.ubuntu.com/3777-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3777-2/ - Third Party Advisory () https://usn.ubuntu.com/3777-2/ - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2018/09/02/1 - Mailing List, Patch, Third Party Advisory () https://www.openwall.com/lists/oss-security/2018/09/02/1 - Mailing List, Patch, Third Party Advisory
CVSS v2 : 4.6
v3 : 7.8
v2 : 4.6
v3 : 7.0

Information

Published : 2018-09-11 14:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-10853

Mitre link : CVE-2018-10853

CVE.ORG link : CVE-2018-10853


JSON object : View

Products Affected

linux

  • linux_kernel

canonical

  • ubuntu_linux

debian

  • debian_linux
CWE
CWE-250

Execution with Unnecessary Privileges

CWE-269

Improper Privilege Management