A vulnerability was discovered in the Linux kernel that allows an attacker to escalate privileges with using a 64-bit ARM architecture. A local attacker with permission to create KVM-based virtual machines can both panic the hypervisor by triggering an illegal exception return (resulting in a DoS) and to redirect execution elsewhere within the hypervisor with full register control, instead of causing a return to the guest.
Find out more about CVE-2018-18021 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS3 Base Score | 6.7 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | High |
User Interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | High |
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 7 (kernel-alt) | RHSA-2018:3656 | 2018-11-26 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise MRG 2 | kernel-rt | Not affected |
Red Hat Enterprise Linux 7 | kernel-rt | Not affected |
Red Hat Enterprise Linux 7 | kernel | Not affected |
Red Hat Enterprise Linux 6 | kernel | Not affected |
Red Hat Enterprise Linux 5 | kernel | Not affected |