CVE-2018-1087

EUVD-2018-11737
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8 HIGH
ADJACENT_NETWORK
LOW
LOW
CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
8 HIGH
ADJACENT_NETWORK
LOW
LOW
CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 11%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
4.16
linuxlinux_kernel
4.16:rc7
linuxlinux_kernel
4.17:rc1
linuxlinux_kernel
4.17:rc2
linuxlinux_kernel
4.17:rc3
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
debiandebian_linux
8.0
debiandebian_linux
9.0
redhatenterprise_linux
7.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
7.2
redhatenterprise_linux_server_aus
7.3
redhatenterprise_linux_server_aus
7.4
redhatenterprise_linux_server_eus
7.3
redhatenterprise_linux_server_eus
7.4
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_server_tus
7.2
redhatenterprise_linux_server_tus
7.3
redhatenterprise_linux_server_tus
7.4
redhatenterprise_linux_virtualization
4.0
redhatenterprise_linux_workstation
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.106-3
fixed
bookworm (security)
6.1.112-1
fixed
bullseye
5.10.223-1
fixed
bullseye (security)
5.10.226-1
fixed
sid
6.11.5-1
fixed
trixie
6.11.5-1
fixed
wheezy
not-affected
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
artful
Fixed 4.13.0-41.46
released
bionic
not-affected
trusty
Fixed 3.13.0-147.196
released
xenial
Fixed 4.4.0-124.148
released
linux-aws
artful
dne
bionic
not-affected
trusty
Fixed 4.4.0-1019.19
released
xenial
Fixed 4.4.0-1057.66
released
linux-azure
artful
dne
bionic
not-affected
trusty
not-affected
xenial
Fixed 4.13.0-1016.19
released
linux-euclid
artful
dne
bionic
dne
trusty
dne
xenial
Fixed 4.4.0-9027.29
released
linux-flo
artful
dne
bionic
dne
trusty
dne
xenial
ignored
linux-gcp
artful
dne
bionic
not-affected
trusty
dne
xenial
Fixed 4.13.0-1015.19
released
linux-gke
artful
dne
bionic
dne
trusty
dne
xenial
ignored
linux-goldfish
artful
dne
bionic
dne
trusty
dne
xenial
ignored
linux-grouper
artful
dne
bionic
dne
trusty
dne
xenial
dne
linux-hwe
artful
dne
bionic
not-affected
trusty
dne
xenial
Fixed 4.13.0-41.46~16.04.1
released
linux-hwe-edge
artful
dne
bionic
Fixed 4.18.0-8.9~18.04.1
released
trusty
dne
xenial
Fixed 4.13.0-41.46~16.04.1
released
linux-kvm
artful
dne
bionic
not-affected
trusty
dne
xenial
Fixed 4.4.0-1023.28
released
linux-lts-trusty
artful
dne
bionic
dne
trusty
dne
xenial
dne
linux-lts-utopic
artful
dne
bionic
dne
trusty
dne
xenial
dne
linux-lts-vivid
artful
dne
bionic
dne
trusty
dne
xenial
dne
linux-lts-wily
artful
dne
bionic
dne
trusty
dne
xenial
dne
linux-lts-xenial
artful
dne
bionic
dne
trusty
Fixed 4.4.0-124.148~14.04.1
released
xenial
dne
linux-maguro
artful
dne
bionic
dne
trusty
dne
xenial
dne
linux-mako
artful
dne
bionic
dne
trusty
dne
xenial
ignored
linux-manta
artful
dne
bionic
dne
trusty
dne
xenial
dne
linux-oem
artful
dne
bionic
not-affected
trusty
dne
xenial
Fixed 4.13.0-1026.29
released
linux-raspi2
artful
not-affected
bionic
not-affected
trusty
dne
xenial
not-affected
linux-snapdragon
artful
not-affected
bionic
not-affected
trusty
dne
xenial
not-affected