Oval Definition:oval:com.ubuntu.xenial:def:201818021000
Revision Date:2018-10-07Version:1
Title:CVE-2018-18021 on Ubuntu 16.04 LTS (xenial) - medium.
Description:arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a denial of service (hypervisor panic) via an illegal exception return. This occurs because of insufficient restrictions on userspace access to the core register file, and because PSTATE.M validation does not prevent unintended execution modes. It was discovered that the KVM implementation in the Linux kernel on ARM 64bit processors did not properly handle some ioctls. An attacker with the privilege to create KVM-based virtual machines could use this to cause a denial of service (host system crash) or execute arbitrary code in the host.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2018-18021
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • The 'linux' package in xenial was vulnerable but has been fixed (note: '4.4.0-139.165').
  • OR NOT While related to the CVE in some way, the 'linux-aws' package in xenial is not affected (note: 'ARM64 only').
  • OR The 'linux-aws-hwe' package in xenial was vulnerable but has been fixed (note: '4.15.0-1035.37~16.04.1').
  • OR NOT While related to the CVE in some way, the 'linux-azure' package in xenial is not affected (note: 'ARM64 only').
  • OR NOT While related to the CVE in some way, the 'linux-azure-edge' package in xenial is not affected (note: 'ARM64 only').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed ESM criteria').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR NOT While related to the CVE in some way, the 'linux-gcp' package in xenial is not affected (note: 'ARM64 only').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
  • OR The 'linux-hwe' package in xenial was vulnerable but has been fixed (note: '4.15.0-47.50~16.04.1').
  • OR The 'linux-hwe-edge' package in xenial was vulnerable but has been fixed (note: '4.15.0-47.50~16.04.1').
  • OR NOT While related to the CVE in some way, the 'linux-kvm' package in xenial is not affected (note: 'ARM64 only').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needs-triage now end-of-life').
  • OR The 'linux-oracle' package in xenial was vulnerable but has been fixed (note: '4.15.0-1010.12~16.04.1').
  • OR The 'linux-raspi2' package in xenial was vulnerable but has been fixed (note: '4.4.0-1100.108').
  • OR The 'linux-snapdragon' package in xenial was vulnerable but has been fixed (note: '4.4.0-1104.109').
  • BACK