First published: Fri Apr 13 2018(Updated: )
A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. Upstream patch: --------------- -> <a href="https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9">https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2018/05/08/4">http://www.openwall.com/lists/oss-security/2018/05/08/4</a>
Credit: Andy Lutomirski Nick Peterson (linkedin.com/in/everdox) Everdox Tech LLC cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.18-348.39.2.el5 | 0:2.6.18-348.39.2.el5 |
redhat/kernel | <0:2.6.18-431.el5 | 0:2.6.18-431.el5 |
redhat/kernel | <0:2.6.32-696.28.1.el6 | 0:2.6.32-696.28.1.el6 |
redhat/kernel | <0:2.6.32-358.88.2.el6 | 0:2.6.32-358.88.2.el6 |
redhat/kernel | <0:2.6.32-431.89.2.el6 | 0:2.6.32-431.89.2.el6 |
redhat/kernel | <0:2.6.32-504.68.2.el6 | 0:2.6.32-504.68.2.el6 |
redhat/kernel | <0:2.6.32-573.55.2.el6 | 0:2.6.32-573.55.2.el6 |
redhat/kernel-rt | <0:3.10.0-862.2.3.rt56.806.el7 | 0:3.10.0-862.2.3.rt56.806.el7 |
redhat/kernel | <0:3.10.0-862.2.3.el7 | 0:3.10.0-862.2.3.el7 |
redhat/kernel | <0:3.10.0-327.66.3.el7 | 0:3.10.0-327.66.3.el7 |
redhat/kernel | <0:3.10.0-514.48.3.el7 | 0:3.10.0-514.48.3.el7 |
redhat/kernel | <0:3.10.0-693.25.4.el7 | 0:3.10.0-693.25.4.el7 |
redhat/kernel-rt | <1:3.10.0-693.25.4.rt56.613.el6 | 1:3.10.0-693.25.4.rt56.613.el6 |
redhat/imgbased | <0:1.0.16-0.1.el7e | 0:1.0.16-0.1.el7e |
redhat/ovirt-node-ng | <0:4.2.0-0.20170814.0.el7 | 0:4.2.0-0.20170814.0.el7 |
redhat/redhat-release-virtualization-host | <0:4.2-3.0.el7 | 0:4.2-3.0.el7 |
redhat/rhev-hypervisor7 | <0:7.3-20180521.1.el6e | 0:7.3-20180521.1.el6e |
redhat/rhev-hypervisor7 | <0:7.3-20180521.1.el7e | 0:7.3-20180521.1.el7e |
debian/linux | 5.10.223-1 6.1.106-3 6.1.99-1 6.10.9-1 | |
debian/xen | 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.3+10-g091466ba55-1~deb12u1 4.17.3+36-g54dacb5c02-1 | |
macOS High Sierra | <10.13.5 | 10.13.5 |
macOS High Sierra | ||
Apple El Capitan | ||
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 | |
Red Hat Enterprise Virtualization Manager | =3.0 | |
XenServer | =6.0.2 | |
XenServer | =6.2.0 | |
XenServer | =6.5 | |
XenServer | =7.0 | |
XenServer | =7.1 | |
XenServer | =7.2 | |
XenServer | =7.3 | |
XenServer | =7.4 | |
synology skynas | ||
Synology DiskStation Manager | =5.2 | |
Synology DiskStation Manager | =6.0 | |
Synology DiskStation Manager | =6.1 | |
Apple iOS and macOS | <10.13.4 | |
Xen xen-unstable | ||
FreeBSD FreeBSD | >=11.0<11.1 | |
Debian | =7.0 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2018-8897 has a medium severity rating, indicating a moderate level of risk associated with exploitation.
To fix CVE-2018-8897, ensure that your Linux kernel is updated to the appropriate patched version as specified by the vendor.
CVE-2018-8897 affects various versions of the Linux kernel across distributions like Red Hat and Debian.
CVE-2018-8897 is considered non-remotely exploitable; it requires local access to the system for exploitation.
CVE-2018-8897 is related to improper exception handling during stack switch operations in the Linux kernel.