First published: Thu Jun 28 2018(Updated: )
A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This <a href="https://access.redhat.com/security/cve/CVE-2018-10872">CVE-2018-10872</a> was assigned due to regression of <a href="https://access.redhat.com/security/cve/CVE-2018-8897">CVE-2018-8897</a> in Red Hat Enterprise Linux 6.10. No other versions are affected by this CVE. Upstream patch: --------------- -> <a href="https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9">https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2018/05/08/4">http://www.openwall.com/lists/oss-security/2018/05/08/4</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-754.2.1.el6 | 0:2.6.32-754.2.1.el6 |
Red Hat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Workstation | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10872 has been rated as a high-severity vulnerability due to its potential impact on system stability.
To mitigate CVE-2018-10872, you should upgrade to the latest kernel version provided by Red Hat.
CVE-2018-10872 affects Red Hat Enterprise Linux 6.0 and its variants including server, desktop, and workstation editions.
CVE-2018-10872 is a security vulnerability related to the Linux kernel's handling of exceptions during stack switch operations.
While there are no specific reports of active exploitation for CVE-2018-10872, it is recommended to apply the fix promptly to mitigate risks.