4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
28.3%
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1,
kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the
Linux kernel’s KVM hypervisor handled exceptions delivered after a stack
switch operation via Mov SS or Pop SS instructions. During the stack switch
operation, the processor did not deliver interrupts and exceptions, rather
they are delivered once the first instruction after the stack switch is
executed. An unprivileged KVM guest user could use this flaw to crash the
guest or, potentially, escalate their privileges in the guest.
Author | Note |
---|---|
tyhicks | Thanks to Andy Lutomirski for help in Linux kernel research and test case |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 17.10 | noarch | linux | < 4.13.0-41.46 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < 3.13.0-147.196 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-124.148 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1019.19 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1057.66 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < 4.13.0-1016.19 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-euclid | < 4.4.0-9027.29 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-gcp | < 4.13.0-1015.19 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe | < 4.13.0-41.46~16.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe-edge | < 4.18.0-8.9~18.04.1 | UNKNOWN |
4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
8 High
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
28.3%