7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
3.6 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:P/A:P
0.001 Low
EPSS
Percentile
27.0%
arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the
arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by
attackers who can create virtual machines. An attacker can arbitrarily
redirect the hypervisor flow of control (with full register control). An
attacker can also cause a denial of service (hypervisor panic) via an
illegal exception return. This occurs because of insufficient restrictions
on userspace access to the core register file, and because PSTATE.M
validation does not prevent unintended execution modes.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-47.50 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-139.165 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < 4.15.0-1035.37~16.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe | < 4.15.0-47.50~16.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe-edge | < 4.15.0-47.50~16.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | < 4.4.0-139.165~14.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-oracle | < 4.15.0-1010.12 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-oracle | < 4.15.0-1010.12~16.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-raspi2 | < 4.15.0-1033.35 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-raspi2 | < 4.4.0-1100.108 | UNKNOWN |
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f93459d689d990b3ecfbe782fec89b97d3279
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d26c25a9d19b5976b319af528886f89cf455692d
cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.12
git.kernel.org/linus/2a3f93459d689d990b3ecfbe782fec89b97d3279
git.kernel.org/linus/d26c25a9d19b5976b319af528886f89cf455692d
github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279
github.com/torvalds/linux/commit/d26c25a9d19b5976b319af528886f89cf455692d
launchpad.net/bugs/cve/CVE-2018-18021
nvd.nist.gov/vuln/detail/CVE-2018-18021
security-tracker.debian.org/tracker/CVE-2018-18021
ubuntu.com/security/notices/USN-3821-1
ubuntu.com/security/notices/USN-3821-2
ubuntu.com/security/notices/USN-3931-1
ubuntu.com/security/notices/USN-3931-2
www.cve.org/CVERecord?id=CVE-2018-18021
www.openwall.com/lists/oss-security/2018/10/02/2
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
3.6 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:P/A:P
0.001 Low
EPSS
Percentile
27.0%