CVE-2018-14678 — Improper Initialization in Kernel
Severity
7.8HIGHNVD
EPSS
0.1%
top 76.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 28
Latest updateMay 13
Description
An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages5 packages
Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 14.04, 16.04, 18.04
Patches
🔴Vulnerability Details
4OSV▶
linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-oracle, linux-raspi2 vulnerabilities↗2019-04-02
📋Vendor Advisories
4Debian▶
CVE-2018-14678: linux - An issue was discovered in the Linux kernel through 4.17.11, as used in Xen thro...↗2018
📄Research Papers
1arXiv
▶
💬Community
3Bugzilla
▶
Bugzilla
▶