CVE-2018-1087

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
References
Link Resource
http://www.openwall.com/lists/oss-security/2018/05/08/5 Mailing List
http://www.securityfocus.com/bid/104127 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040862 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:1318 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1345 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1347 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1348 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1355 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1524 Third Party Advisory
https://access.redhat.com/security/vulnerabilities/pop_ss Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087 Issue Tracking
https://usn.ubuntu.com/3641-1/ Third Party Advisory
https://usn.ubuntu.com/3641-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4196 Third Party Advisory
http://www.openwall.com/lists/oss-security/2018/05/08/5 Mailing List
http://www.securityfocus.com/bid/104127 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040862 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:1318 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1345 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1347 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1348 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1355 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1524 Third Party Advisory
https://access.redhat.com/security/vulnerabilities/pop_ss Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087 Issue Tracking
https://usn.ubuntu.com/3641-1/ Third Party Advisory
https://usn.ubuntu.com/3641-2/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4196 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:4.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.16:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.17:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.17:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:4.17:rc3:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_virtualization:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-05-15 16:29

Updated : 2024-11-21 03:59


NVD link : CVE-2018-1087

Mitre link : CVE-2018-1087

CVE.ORG link : CVE-2018-1087


JSON object : View

Products Affected

redhat

  • enterprise_linux_workstation
  • enterprise_linux_virtualization
  • enterprise_linux_server_aus
  • enterprise_linux_desktop
  • enterprise_linux
  • enterprise_linux_server
  • enterprise_linux_server_eus
  • enterprise_linux_server_tus

debian

  • debian_linux

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-250

Execution with Unnecessary Privileges

NVD-CWE-noinfo