First published: Sat Jul 28 2018(Updated: )
An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >=4.14.21<4.14.61 | |
Linux Linux kernel | >=4.15.5<4.17.13 | |
Xen Xen | <=4.11.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.3-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-14678.
The affected software for this vulnerability includes the Linux kernel versions through 4.17.11, as used in Xen through 4.11.x.
This vulnerability allows local users to cause a denial of service (uninitialized memory usage and system crash).
To fix this vulnerability, update your Linux kernel to version 4.18 or higher.
You can find more information about this vulnerability at the following references: [Xen Security Advisory 274](https://xenbits.xen.org/xsa/advisory-274.html), [SecurityFocus BID 104924](http://www.securityfocus.com/bid/104924), [SecurityTracker ID 1041397](http://www.securitytracker.com/id/1041397).