Unrated severityNVD Advisory· Published Jan 3, 2019· Updated Aug 5, 2024
CVE-2018-16882
CVE-2018-16882
Description
A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions before 4.14.91 and before 4.19.13 are vulnerable.
Affected products
28- osv-coords27 versionspkg:rpm/suse/kernel-default&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/kernel-source&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/kernel-syms&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-BCLpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_41&distro=HPE%20Helion%20OpenStack%208pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_41&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_41&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_41&distro=SUSE%20OpenStack%20Cloud%208pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_41&distro=SUSE%20OpenStack%20Cloud%20Crowbar%208
< 4.4.180-94.150.1+ 26 more
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.121-92.161.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.121-92.161.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.121-92.161.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 4.4.180-94.150.1
- (no CPE)range: < 1-4.3.1
- (no CPE)range: < 1-4.3.1
- (no CPE)range: < 1-4.3.1
- (no CPE)range: < 1-4.3.1
- (no CPE)range: < 1-4.3.1
- The Linux Foundation/kernel:v5Range: before 4.14.91
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- usn.ubuntu.com/3871-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3871-3/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3871-4/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3871-5/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3872-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3878-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3878-2/mitrevendor-advisoryx_refsource_UBUNTU
- www.securityfocus.com/bid/106254mitrevdb-entryx_refsource_BID
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- lwn.net/Articles/775720/mitrex_refsource_CONFIRM
- lwn.net/Articles/775721/mitrex_refsource_CONFIRM
- marc.infomitrex_refsource_MISC
- support.f5.com/csp/article/K80557033mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.