CVE-2018-16882

A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions before 4.14.91 and before 4.19.13 are vulnerable.
References
Link Resource
http://www.securityfocus.com/bid/106254 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16882 Issue Tracking Patch Third Party Advisory
https://lwn.net/Articles/775720/ Third Party Advisory
https://lwn.net/Articles/775721/ Third Party Advisory
https://marc.info/?l=kvm&m=154514994222809&w=2 Patch Third Party Advisory
https://support.f5.com/csp/article/K80557033 Third Party Advisory
https://usn.ubuntu.com/3871-1/ Third Party Advisory
https://usn.ubuntu.com/3871-3/ Third Party Advisory
https://usn.ubuntu.com/3871-4/ Third Party Advisory
https://usn.ubuntu.com/3871-5/ Third Party Advisory
https://usn.ubuntu.com/3872-1/ Third Party Advisory
https://usn.ubuntu.com/3878-1/ Third Party Advisory
https://usn.ubuntu.com/3878-2/ Third Party Advisory
http://www.securityfocus.com/bid/106254 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16882 Issue Tracking Patch Third Party Advisory
https://lwn.net/Articles/775720/ Third Party Advisory
https://lwn.net/Articles/775721/ Third Party Advisory
https://marc.info/?l=kvm&m=154514994222809&w=2 Patch Third Party Advisory
https://support.f5.com/csp/article/K80557033 Third Party Advisory
https://usn.ubuntu.com/3871-1/ Third Party Advisory
https://usn.ubuntu.com/3871-3/ Third Party Advisory
https://usn.ubuntu.com/3871-4/ Third Party Advisory
https://usn.ubuntu.com/3871-5/ Third Party Advisory
https://usn.ubuntu.com/3872-1/ Third Party Advisory
https://usn.ubuntu.com/3878-1/ Third Party Advisory
https://usn.ubuntu.com/3878-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

History

21 Nov 2024, 03:53

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106254 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106254 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16882 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16882 - Issue Tracking, Patch, Third Party Advisory
References () https://lwn.net/Articles/775720/ - Third Party Advisory () https://lwn.net/Articles/775720/ - Third Party Advisory
References () https://lwn.net/Articles/775721/ - Third Party Advisory () https://lwn.net/Articles/775721/ - Third Party Advisory
References () https://marc.info/?l=kvm&m=154514994222809&w=2 - Patch, Third Party Advisory () https://marc.info/?l=kvm&m=154514994222809&w=2 - Patch, Third Party Advisory
References () https://support.f5.com/csp/article/K80557033 - Third Party Advisory () https://support.f5.com/csp/article/K80557033 - Third Party Advisory
References () https://usn.ubuntu.com/3871-1/ - Third Party Advisory () https://usn.ubuntu.com/3871-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3871-3/ - Third Party Advisory () https://usn.ubuntu.com/3871-3/ - Third Party Advisory
References () https://usn.ubuntu.com/3871-4/ - Third Party Advisory () https://usn.ubuntu.com/3871-4/ - Third Party Advisory
References () https://usn.ubuntu.com/3871-5/ - Third Party Advisory () https://usn.ubuntu.com/3871-5/ - Third Party Advisory
References () https://usn.ubuntu.com/3872-1/ - Third Party Advisory () https://usn.ubuntu.com/3872-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3878-1/ - Third Party Advisory () https://usn.ubuntu.com/3878-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3878-2/ - Third Party Advisory () https://usn.ubuntu.com/3878-2/ - Third Party Advisory

Information

Published : 2019-01-03 16:29

Updated : 2024-11-21 03:53


NVD link : CVE-2018-16882

Mitre link : CVE-2018-16882

CVE.ORG link : CVE-2018-16882


JSON object : View

Products Affected

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free