First published: Fri Apr 13 2018(Updated: )
A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. Upstream patch: --------------- -> <a href="https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9">https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2018/05/08/4">http://www.openwall.com/lists/oss-security/2018/05/08/4</a>
Credit: Andy Lutomirski Nick Peterson (linkedin.com/in/everdox) Everdox Tech LLC cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.18-348.39.2.el5 | 0:2.6.18-348.39.2.el5 |
redhat/kernel | <0:2.6.18-431.el5 | 0:2.6.18-431.el5 |
redhat/kernel | <0:2.6.32-696.28.1.el6 | 0:2.6.32-696.28.1.el6 |
redhat/kernel | <0:2.6.32-358.88.2.el6 | 0:2.6.32-358.88.2.el6 |
redhat/kernel | <0:2.6.32-431.89.2.el6 | 0:2.6.32-431.89.2.el6 |
redhat/kernel | <0:2.6.32-504.68.2.el6 | 0:2.6.32-504.68.2.el6 |
redhat/kernel | <0:2.6.32-573.55.2.el6 | 0:2.6.32-573.55.2.el6 |
redhat/kernel-rt | <0:3.10.0-862.2.3.rt56.806.el7 | 0:3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel | <0:3.10.0-862.2.3.el7 | 0:3.10.0-862.2.3.el7 |
redhat/kernel | <0:3.10.0-327.66.3.el7 | 0:3.10.0-327.66.3.el7 |
redhat/kernel | <0:3.10.0-514.48.3.el7 | 0:3.10.0-514.48.3.el7 |
redhat/kernel | <0:3.10.0-693.25.4.el7 | 0:3.10.0-693.25.4.el7 |
redhat/kernel-rt | <1:3.10.0-693.25.4.rt56.613.el6 | 1:3.10.0-693.25.4.rt56.613.el6 |
redhat/imgbased | <0:1.0.16-0.1.el7e | 0:1.0.16-0.1.el7e |
redhat/ovirt-node-ng | <0:4.2.0-0.20170814.0.el7 | 0:4.2.0-0.20170814.0.el7 |
redhat/redhat-release-virtualization-host | <0:4.2-3.0.el7 | 0:4.2-3.0.el7 |
redhat/rhev-hypervisor7 | <0:7.3-20180521.1.el6e | 0:7.3-20180521.1.el6e |
redhat/rhev-hypervisor7 | <0:7.3-20180521.1.el7e | 0:7.3-20180521.1.el7e |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Redhat Enterprise Virtualization Manager | =3.0 | |
Citrix XenServer | =6.0.2 | |
Citrix XenServer | =6.2.0 | |
Citrix XenServer | =6.5 | |
Citrix XenServer | =7.0 | |
Citrix XenServer | =7.1 | |
Citrix XenServer | =7.2 | |
Citrix XenServer | =7.3 | |
Citrix XenServer | =7.4 | |
Synology Skynas | ||
Synology DiskStation Manager | =5.2 | |
Synology DiskStation Manager | =6.0 | |
Synology DiskStation Manager | =6.1 | |
Apple Mac OS X | <10.13.4 | |
Xen Xen | ||
FreeBSD FreeBSD | >=11.0<11.1 | |
Apple macOS High Sierra | <10.13.5 | 10.13.5 |
Apple Sierra | ||
Apple El Capitan | ||
debian/linux | 5.10.223-1 6.1.106-3 6.1.99-1 6.10.9-1 | |
debian/xen | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.3+10-g091466ba55-1~deb12u1 4.17.3+36-g54dacb5c02-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)