CVE-2018-18021
Published: 7 October 2018
arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a denial of service (hypervisor panic) via an illegal exception return. This occurs because of insufficient restrictions on userspace access to the core register file, and because PSTATE.M validation does not prevent unintended execution modes.
From the Ubuntu Security Team
It was discovered that the KVM implementation in the Linux kernel on ARM 64bit processors did not properly handle some ioctls. An attacker with the privilege to create KVM-based virtual machines could use this to cause a denial of service (host system crash) or execute arbitrary code in the host.
Priority
Status
Package | Release | Status |
---|---|---|
linux-aws Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(ARM64 only)
|
cosmic |
Not vulnerable
(4.18.0-1002.3)
|
|
trusty |
Not vulnerable
(ARM64 only)
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Not vulnerable
(ARM64 only)
|
|
linux-flo Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Ignored
(abandoned)
|
|
linux-aws-hwe Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Released
(4.15.0-1035.37~16.04.1)
|
|
linux-azure Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(ARM64 only)
|
cosmic |
Not vulnerable
(4.18.0-1003.3)
|
|
trusty |
Not vulnerable
(ARM64 only)
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Not vulnerable
(ARM64 only)
|
|
linux Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-47.50)
|
cosmic |
Not vulnerable
(4.18.0-9.10)
|
|
trusty |
Ignored
(arm64 not supported in 14.04)
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Released
(4.4.0-139.165)
|
|
Patches: Introduced by 0d854a60b1d7d39a37b25dd28f63cfa0df637b91 Introduced by 2f4a07c5f9fe4a5cdb9867e1e2fcab3165846ea7 |
||
linux-azure-edge Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(ARM64 only)
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Not vulnerable
(ARM64 only)
|
|
linux-euclid Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Ignored
(was needed ESM criteria)
|
|
linux-gcp Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(ARM64 only)
|
cosmic |
Not vulnerable
(4.18.0-1002.3)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Not vulnerable
(ARM64 only)
|
|
linux-gcp-edge Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.18.0-1004.5~18.04.1)
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Does not exist
|
|
linux-gke Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Ignored
(end of standard support)
|
|
linux-goldfish Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Ignored
(end of life)
|
|
linux-grouper Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Does not exist
|
|
linux-hwe Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(4.18.0-13.14~18.04.1)
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Released
(4.15.0-47.50~16.04.1)
|
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(5.0.0-8.9~18.04.1)
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Released
(4.15.0-47.50~16.04.1)
|
|
linux-kvm Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(ARM64 only)
|
cosmic |
Not vulnerable
(4.18.0-1003.3)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Not vulnerable
(ARM64 only)
|
|
linux-lts-trusty Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Does not exist
|
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Does not exist
|
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Does not exist
|
|
linux-lts-wily Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [end of standard support])
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Does not exist
|
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Released
(4.4.0-139.165~14.04.1)
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Does not exist
|
|
linux-maguro Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Does not exist
|
|
linux-mako Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Ignored
(abandoned)
|
|
linux-manta Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
(trusty was ignored [abandoned])
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Does not exist
|
|
linux-oem Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(ARM64 only)
|
cosmic |
Not vulnerable
(ARM64 only)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Ignored
(end of standard support, was needs-triage)
|
|
linux-oracle Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-1010.12)
|
cosmic |
Not vulnerable
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Released
(4.15.0-1010.12~16.04.1)
|
|
linux-raspi2 Launchpad, Ubuntu, Debian |
bionic |
Released
(4.15.0-1033.35)
|
cosmic |
Not vulnerable
(4.18.0-1005.7)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Released
(4.4.0-1100.108)
|
|
linux-snapdragon Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
|
cosmic |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(4.19~rc7)
|
|
xenial |
Released
(4.4.0-1104.109)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.1 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18021
- https://git.kernel.org/linus/d26c25a9d19b5976b319af528886f89cf455692d
- https://git.kernel.org/linus/2a3f93459d689d990b3ecfbe782fec89b97d3279
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f93459d689d990b3ecfbe782fec89b97d3279
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d26c25a9d19b5976b319af528886f89cf455692d
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.12
- https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279
- https://github.com/torvalds/linux/commit/d26c25a9d19b5976b319af528886f89cf455692d
- https://www.openwall.com/lists/oss-security/2018/10/02/2
- https://ubuntu.com/security/notices/USN-3821-1
- https://ubuntu.com/security/notices/USN-3821-2
- https://ubuntu.com/security/notices/USN-3931-1
- https://ubuntu.com/security/notices/USN-3931-2
- NVD
- Launchpad
- Debian