CVE-2018-10901

Impact:
Important
Public Date:
2010-08-02
CWE:
CWE-665
Bugzilla:
1601849: CVE-2018-10901 kernel: kvm: vmx: host GDT limit corruption
A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.

Find out more about CVE-2018-10901 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 7.8
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (kernel) RHSA-2018:2390 2018-08-14
Red Hat Enterprise Linux Server TUS (v. 6.6) (kernel) RHSA-2018:2392 2018-08-14
Red Hat Enterprise Linux Advanced Update Support 6.6 (kernel) RHSA-2018:2392 2018-08-14
Red Hat Enterprise Linux Extended Update Support 6.7 (kernel) RHSA-2018:2391 2018-08-14
Red Hat Enterprise Linux Advanced Update Support 6.4 (kernel) RHSA-2018:2394 2018-08-14
Red Hat Enterprise Linux Advanced Update Support 6.5 (kernel) RHSA-2018:2393 2018-08-14

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 realtime-kernel Not affected
Red Hat Enterprise Linux 7 kernel-rt Not affected
Red Hat Enterprise Linux 7 kernel-alt Not affected
Red Hat Enterprise Linux 7 kernel Not affected
Red Hat Enterprise Linux 5 kernel Not affected

Acknowledgements

Red Hat would like to thank Vegard Nossum (Oracle Corporation) for reporting this issue.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.