Revision Date: | 2018-10-07 | Version: | 1 | Title: | CVE-2018-18021 on Ubuntu 14.04 LTS (trusty) - medium. | Description: | arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a denial of service (hypervisor panic) via an illegal exception return. This occurs because of insufficient restrictions on userspace access to the core register file, and because PSTATE.M validation does not prevent unintended execution modes. It was discovered that the KVM implementation in the Linux kernel on ARM 64bit processors did not properly handle some ioctls. An attacker with the privilege to create KVM-based virtual machines could use this to cause a denial of service (host system crash) or execute arbitrary code in the host.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2018-18021
| Platform(s): | Ubuntu 14.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 14.04 LTS (trusty) is installed. AND Package Information
While related to the CVE in some way, a decision has been made to ignore it (note: 'arm64 not supported in 14.04').
OR NOT While related to the CVE in some way, the 'linux-aws' package in trusty is not affected (note: 'ARM64 only').
OR NOT While related to the CVE in some way, the 'linux-azure' package in trusty is not affected (note: 'ARM64 only').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
OR The 'linux-lts-xenial' package in trusty was vulnerable but has been fixed (note: '4.4.0-139.165~14.04.1').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
|
|