Логотип exploitDog
bind:CVE-2018-1087
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-1087

Количество 36

Количество 36

ubuntu логотип

CVE-2018-1087

около 7 лет назад

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.

CVSS3: 8
EPSS: Низкий
redhat логотип

CVE-2018-1087

около 7 лет назад

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.

CVSS3: 8
EPSS: Низкий
nvd логотип

CVE-2018-1087

около 7 лет назад

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.

CVSS3: 8
EPSS: Низкий
debian логотип

CVE-2018-1087

около 7 лет назад

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-r ...

CVSS3: 8
EPSS: Низкий
github логотип

GHSA-j658-wqr4-q3w7

около 3 лет назад

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.

CVSS3: 7.8
EPSS: Низкий
oracle-oval логотип

ELSA-2018-4096

около 7 лет назад

ELSA-2018-4096: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1636-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1523-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1171-1

около 7 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1648-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1645-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1644-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1643-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1642-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1641-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1640-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1639-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1637-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1548-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:1545-1

около 7 лет назад

Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-1087

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.

CVSS3: 8
0%
Низкий
около 7 лет назад
redhat логотип
CVE-2018-1087

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.

CVSS3: 8
0%
Низкий
около 7 лет назад
nvd логотип
CVE-2018-1087

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.

CVSS3: 8
0%
Низкий
около 7 лет назад
debian логотип
CVE-2018-1087

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-r ...

CVSS3: 8
0%
Низкий
около 7 лет назад
github логотип
GHSA-j658-wqr4-q3w7

kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2018-4096

ELSA-2018-4096: Unbreakable Enterprise kernel security update (IMPORTANT)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1636-1

Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP3)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1523-1

Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1171-1

Security update for the Linux Kernel

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1648-1

Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1645-1

Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1644-1

Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1643-1

Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1642-1

Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1641-1

Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1640-1

Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1639-1

Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1637-1

Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1548-1

Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)

около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:1545-1

Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)

около 7 лет назад

Уязвимостей на страницу