CVE-2018-1087

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
References
Link Resource
http://www.openwall.com/lists/oss-security/2018/05/08/5 Mailing List
http://www.securityfocus.com/bid/104127 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040862 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:1318 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1345 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1347 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1348 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1355 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1524 Third Party Advisory
https://access.redhat.com/security/vulnerabilities/pop_ss Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087 Issue Tracking
https://usn.ubuntu.com/3641-1/ Third Party Advisory
https://usn.ubuntu.com/3641-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4196 Third Party Advisory
http://www.openwall.com/lists/oss-security/2018/05/08/5 Mailing List
http://www.securityfocus.com/bid/104127 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040862 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:1318 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1345 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1347 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1348 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1355 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1524 Third Party Advisory
https://access.redhat.com/security/vulnerabilities/pop_ss Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087 Issue Tracking
https://usn.ubuntu.com/3641-1/ Third Party Advisory
https://usn.ubuntu.com/3641-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4196 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:59

Type Values Removed Values Added
CVSS v2 : 4.6
v3 : 7.8
v2 : 4.6
v3 : 8.0
References () http://www.openwall.com/lists/oss-security/2018/05/08/5 - Mailing List () http://www.openwall.com/lists/oss-security/2018/05/08/5 - Mailing List
References () http://www.securityfocus.com/bid/104127 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104127 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040862 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040862 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:1318 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1318 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1345 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1345 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1347 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1347 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1348 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1348 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1355 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1355 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:1524 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:1524 - Third Party Advisory
References () https://access.redhat.com/security/vulnerabilities/pop_ss - Third Party Advisory () https://access.redhat.com/security/vulnerabilities/pop_ss - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087 - Issue Tracking
References () https://usn.ubuntu.com/3641-1/ - Third Party Advisory () https://usn.ubuntu.com/3641-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3641-2/ - Third Party Advisory () https://usn.ubuntu.com/3641-2/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4196 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4196 - Third Party Advisory

Information

Published : 2018-05-15 16:29

Updated : 2024-11-21 03:59


NVD link : CVE-2018-1087

Mitre link : CVE-2018-1087

CVE.ORG link : CVE-2018-1087


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_virtualization
  • enterprise_linux_server_tus
  • enterprise_linux_workstation

canonical

  • ubuntu_linux

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-250

Execution with Unnecessary Privileges

NVD-CWE-noinfo