A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.
http://www.securityfocus.com/bid/104905
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2391
https://access.redhat.com/errata/RHSA-2018:2392
https://access.redhat.com/errata/RHSA-2018:2393
https://access.redhat.com/errata/RHSA-2018:2394
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10901
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Source: MITRE
Published: 2018-07-26
Updated: 2020-07-15
Type: NVD-CWE-noinfo
Base Score: 7.2
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 3.9
Severity: HIGH
Base Score: 7.8
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH
OR
OR
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
127408 | NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0143) | Nessus | NewStart CGSL Local Security Checks | critical |
121068 | Juniper Junos Space 18.4.x < 18.4R1 Multiple Vulnerabilities (JSA10917) | Nessus | Junos Local Security Checks | high |
112018 | Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-055) | Nessus | Virtuozzo Local Security Checks | high |
111777 | Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20180814) (Foreshadow) | Nessus | Scientific Linux Local Security Checks | high |
111735 | RHEL 6 : kernel (RHSA-2018:2394) (Foreshadow) (Spectre) | Nessus | Red Hat Local Security Checks | high |
111734 | RHEL 6 : kernel (RHSA-2018:2393) (Foreshadow) | Nessus | Red Hat Local Security Checks | high |
111733 | RHEL 6 : kernel (RHSA-2018:2392) (Foreshadow) | Nessus | Red Hat Local Security Checks | high |
111732 | RHEL 6 : kernel (RHSA-2018:2391) (Foreshadow) | Nessus | Red Hat Local Security Checks | high |
111731 | RHEL 6 : kernel (RHSA-2018:2390) (Foreshadow) | Nessus | Red Hat Local Security Checks | high |
111724 | Oracle Linux 6 : kernel (ELSA-2018-2390) (Foreshadow) | Nessus | Oracle Linux Local Security Checks | high |
111704 | CentOS 6 : kernel (CESA-2018:2390) (Foreshadow) | Nessus | CentOS Local Security Checks | high |
110197 | Amazon Linux AMI : kernel (ALAS-2018-1023) | Nessus | Amazon Linux Local Security Checks | high |
109177 | Amazon Linux 2 : kernel (ALAS-2018-994) | Nessus | Amazon Linux Local Security Checks | high |