Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-10901

Опубликовано: 02 авг. 2010
Источник: redhat
CVSS3: 7.8

Описание

A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-altNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise MRG 2realtime-kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2018:239014.08.2018
Red Hat Enterprise Linux 6.4 Advanced Update SupportkernelFixedRHSA-2018:239414.08.2018
Red Hat Enterprise Linux 6.5 Advanced Update SupportkernelFixedRHSA-2018:239314.08.2018
Red Hat Enterprise Linux 6.6 Advanced Update SupportkernelFixedRHSA-2018:239214.08.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-665
https://bugzilla.redhat.com/show_bug.cgi?id=1601849kernel: kvm: vmx: host GDT limit corruption

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.

CVSS3: 7.8
nvd
больше 7 лет назад

A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.

CVSS3: 7.8
debian
больше 7 лет назад

A flaw was found in Linux kernel's KVM virtualization subsystem. The V ...

CVSS3: 7.8
github
больше 3 лет назад

A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.

CVSS3: 7.8
fstec
больше 7 лет назад

Уязвимость подсистемы виртуализации Kernel-based Virtual Machine ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии

7.8 High

CVSS3