Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-10872

Опубликовано: 10 июл. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.9
CVSS3: 6.5

Описание

A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897 in Red Hat Enterprise Linux 6.10 GA kernel. No other versions are affected by this CVE.

РелизСтатусПримечание
artful

not-affected

RHEL 6 kernel only
bionic

not-affected

RHEL 6 kernel only
devel

not-affected

RHEL 6 kernel only
esm-infra-legacy/trusty

not-affected

RHEL 6 kernel only
esm-infra/bionic

not-affected

RHEL 6 kernel only
esm-infra/xenial

not-affected

RHEL 6 kernel only
precise/esm

not-affected

RHEL 6 kernel only
trusty

not-affected

RHEL 6 kernel only
trusty/esm

not-affected

RHEL 6 kernel only
upstream

not-affected

debian: Red Hat specific CVE-2018-8897 regression in RHEL 6.10

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

not-affected

RHEL 6 kernel only
devel

not-affected

RHEL 6 kernel only
esm-infra-legacy/trusty

not-affected

RHEL 6 kernel only
esm-infra/bionic

not-affected

RHEL 6 kernel only
esm-infra/xenial

not-affected

RHEL 6 kernel only
precise/esm

DNE

trusty

not-affected

RHEL 6 kernel only
trusty/esm

not-affected

RHEL 6 kernel only
upstream

not-affected

RHEL 6 kernel only

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

not-affected

RHEL 6 kernel only
devel

not-affected

RHEL 6 kernel only
esm-infra-legacy/trusty

not-affected

4.15.0-1023.24~14.04.1
esm-infra/bionic

not-affected

RHEL 6 kernel only
esm-infra/xenial

not-affected

RHEL 6 kernel only
precise/esm

DNE

trusty

not-affected

4.15.0-1023.24~14.04.1
trusty/esm

not-affected

4.15.0-1023.24~14.04.1
upstream

not-affected

RHEL 6 kernel only

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

not-affected

RHEL 6 kernel only
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

RHEL 6 kernel only
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only
xenial

not-affected

RHEL 6 kernel only

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only
xenial

not-affected

RHEL 6 kernel only

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

not-affected

RHEL 6 kernel only
xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

not-affected

RHEL 6 kernel only
devel

not-affected

RHEL 6 kernel only
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

RHEL 6 kernel only
esm-infra/xenial

not-affected

RHEL 6 kernel only
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only
xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

not-affected

RHEL 6 kernel only
xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

not-affected

RHEL 6 kernel only
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

not-affected

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

esm-infra/xenial

not-affected

RHEL 6 kernel only
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

not-affected

RHEL 6 kernel only
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

RHEL 6 kernel only
esm-infra/xenial

not-affected

RHEL 6 kernel only
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

not-affected

RHEL 6 kernel only
devel

not-affected

RHEL 6 kernel only
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

RHEL 6 kernel only
esm-infra/xenial

not-affected

RHEL 6 kernel only
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

not-affected

RHEL 6 kernel only
trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [end of standard support]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [end of standard support]
upstream

not-affected

RHEL 6 kernel only
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [end of standard support]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [end of standard support]
upstream

not-affected

RHEL 6 kernel only
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [end of standard support]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [end of standard support]
upstream

not-affected

RHEL 6 kernel only
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

RHEL 6 kernel only
precise/esm

DNE

trusty

not-affected

RHEL 6 kernel only
trusty/esm

not-affected

RHEL 6 kernel only
upstream

not-affected

RHEL 6 kernel only
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

not-affected

RHEL 6 kernel only
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

not-affected

RHEL 6 kernel only
xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

not-affected

RHEL 6 kernel only
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

not-affected

RHEL 6 kernel only
devel

not-affected

RHEL 6 kernel only
esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

RHEL 6 kernel only
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only
xenial

not-affected

RHEL 6 kernel only

Показывать по

РелизСтатусПримечание
artful

not-affected

RHEL 6 kernel only
bionic

not-affected

RHEL 6 kernel only
devel

not-affected

RHEL 6 kernel only
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only
xenial

not-affected

RHEL 6 kernel only

Показывать по

РелизСтатусПримечание
artful

not-affected

RHEL 6 kernel only
bionic

not-affected

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

not-affected

RHEL 6 kernel only
xenial

not-affected

RHEL 6 kernel only

Показывать по

EPSS

Процентиль: 24%
0.00077
Низкий

4.9 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
redhat
почти 7 лет назад

A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897 in Red Hat Enterprise Linux 6.10 GA kernel. No other versions are affected by this CVE.

CVSS3: 6.5
nvd
почти 7 лет назад

A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897 in Red Hat Enterprise Linux 6.10 GA kernel. No other versions are affected by this CVE.

CVSS3: 6.5
debian
почти 7 лет назад

A flaw was found in the way the Linux kernel handled exceptions delive ...

CVSS3: 5.5
github
около 3 лет назад

A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897 in Red Hat Enterprise Linux 6.10 GA kernel. No other versions are affected by this CVE.

CVSS3: 5.5
fstec
почти 7 лет назад

Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 24%
0.00077
Низкий

4.9 Medium

CVSS2

6.5 Medium

CVSS3

Уязвимость CVE-2018-10872