First published: Fri Aug 03 2018(Updated: )
arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:3.10.0-1062.rt56.1022.el7 | 0:3.10.0-1062.rt56.1022.el7 |
redhat/kernel | <0:3.10.0-1062.el7 | 0:3.10.0-1062.el7 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Linux Kernel | <4.18.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-15594.
CVE-2018-15594 has a severity of medium (5.6).
CVE-2018-15594 affects the Linux kernel before version 4.18.1.
CVE-2018-15594 makes it easier for attackers to conduct Spectre-v2 attacks against paravirtualized guests.
To fix CVE-2018-15594, update the Linux kernel to version 4.18.1 or later.