First published: Fri Apr 13 2018(Updated: )
A flaw was found in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest and/or potentially escalate their privileges in the guest. Upstream patch: --------------- -> <a href="https://git.kernel.org/linus/32d43cd391bacb5f0814c2624399a5dad3501d09">https://git.kernel.org/linus/32d43cd391bacb5f0814c2624399a5dad3501d09</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2018/05/08/5">http://www.openwall.com/lists/oss-security/2018/05/08/5</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =4.16 | |
Linux Linux kernel | =4.16-rc7 | |
Linux Linux kernel | =4.17-rc1 | |
Linux Linux kernel | =4.17-rc2 | |
Linux Linux kernel | =4.17-rc3 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.2 | |
Redhat Enterprise Linux Server Aus | =7.3 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.3 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Server Tus | =7.2 | |
Redhat Enterprise Linux Server Tus | =7.3 | |
Redhat Enterprise Linux Server Tus | =7.4 | |
Redhat Enterprise Linux Virtualization | =4.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
redhat/kernel | <4.16 | 4.16 |
debian/linux | 5.10.223-1 6.1.106-3 6.1.99-1 6.10.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.