Description
An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1531-1 | linux-4.9 security update |
Debian DSA |
DSA-4308-1 | linux security update |
EUVD |
EUVD-2018-6572 | An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges. |
Ubuntu USN |
USN-3931-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3931-2 | Linux kernel (HWE) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T09:38:13.045Z
Reserved: 2018-07-28T00:00:00.000Z
Link: CVE-2018-14678
No data.
Status : Modified
Published: 2018-07-28T18:29:00.243
Modified: 2024-11-21T03:49:34.110
Link: CVE-2018-14678
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN