CVE-2018-1087
moderate-risk
Published 2018-05-15
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
Do I need to act?
-
0.03% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.0/10
High
ADJACENT_NETWORK
/ LOW complexity
Affected Products (20)
References (28)
Third Party Advisory
http://www.securityfocus.com/bid/104127
Third Party Advisory
http://www.securitytracker.com/id/1040862
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1318
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1345
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1347
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1348
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1355
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1524
Third Party Advisory
https://access.redhat.com/security/vulnerabilities/pop_ss
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1087
Third Party Advisory
https://usn.ubuntu.com/3641-1/
Third Party Advisory
https://usn.ubuntu.com/3641-2/
Third Party Advisory
https://www.debian.org/security/2018/dsa-4196
Third Party Advisory
http://www.securityfocus.com/bid/104127
Third Party Advisory
http://www.securitytracker.com/id/1040862
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1318
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1345
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1347
and 8 more references
46
/ 100
moderate-risk
Severity
25/34 · High
Exploitability
0/34 · Minimal
Exposure
21/34 · High