CVE-2018-14678

CVSS v3.1 7.8 (High)
78% Progress
CVSS v2.0 7.2 (High)
72% Progress
EPSS 0.04 % (5th)
0.04% Progress
Affected Products 4
Advisories 42

An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.

Weaknesses
CWE-665
Improper Initialization
CVE Status
PUBLISHED
CNA
MITRE
Published Date
2018-07-28 18:29:00
(6 years ago)
Updated Date
2023-02-24 18:35:08
(19 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel from 4.14.21 version and prior 4.14.61 version cpe:2.3:o:linux:linux_kernel >= 4.14.21 < 4.14.61
  Linux Kernel from 4.15.5 version and prior 4.17.13 version cpe:2.3:o:linux:linux_kernel >= 4.15.5 < 4.17.13

Configuration #2

    CPE23 From Up To
  Xen 4.11.0 and prior versions cpe:2.3:o:xen:xen <= 4.11.0

Configuration #3

    CPE23 From Up To
  Debian Linux 8.0 cpe:2.3:o:debian:debian_linux:8.0
  Debian Linux 9.0 cpe:2.3:o:debian:debian_linux:9.0

Configuration #4

    CPE23 From Up To
  Canonical Ubuntu Linux 14.04 cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm
  Canonical Ubuntu Linux 16.04 cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm
  Canonical Ubuntu Linux 18.04 cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...