CVE-2018-8897
Description
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
Affected products
166- osv-coords166 versionspkg:rpm/opensuse/xen&distro=openSUSE%20Tumbleweedpkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-bigsmp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-syms&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-xen&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_25&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_25&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_26&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_26&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_27&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_10&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_10&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_11&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_11&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_12&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_12&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_13&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_13&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_14&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_14&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_15&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_17&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_18&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_19&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_20&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_21&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_21&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_21&distro=SUSE%20OpenStack%20Cloud%207pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_8&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_8&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_9&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_9&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_10&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_2&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_5&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_7&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_8&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3pkg:rpm/suse/kgraft-patch-SLE12_Update_22&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_23&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_25&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_26&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_27&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_28&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_29&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_30&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_31&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_32&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_33&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kgraft-patch-SLE12_Update_34&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/xen&distro=SUSE%20Enterprise%20Storage%204pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCLpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%207
< 4.15.1_01-1.2+ 165 more
- (no CPE)range: < 4.15.1_01-1.2
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.12.61-52.128.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.12.61-52.128.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.12.61-52.128.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 4.4.121-92.73.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-0.47.106.22.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 3.12.61-52.128.1
- (no CPE)range: < 3.0.101-108.41.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 3.12.74-60.64.88.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 1-2.3.1
- (no CPE)range: < 1-2.3.1
- (no CPE)range: < 1-2.3.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 3-2.1
- (no CPE)range: < 3-2.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 12-2.1
- (no CPE)range: < 12-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 3-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 7-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 11-2.1
- (no CPE)range: < 10-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 9-2.1
- (no CPE)range: < 8-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 6-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 5-2.1
- (no CPE)range: < 4-2.1
- (no CPE)range: < 1-1.3.1
- (no CPE)range: < 4.7.5_02-43.30.1
- (no CPE)range: < 4.9.2_04-3.29.1
- (no CPE)range: < 4.2.5_21-45.22.1
- (no CPE)range: < 4.2.5_21-45.22.1
- (no CPE)range: < 4.4.4_30-61.26.1
- (no CPE)range: < 4.5.5_24-22.46.1
- (no CPE)range: < 4.7.5_02-43.30.1
- (no CPE)range: < 4.7.5_02-43.30.1
- (no CPE)range: < 4.9.2_04-3.29.1
- (no CPE)range: < 4.4.4_30-22.65.1
- (no CPE)range: < 4.4.4_30-61.26.1
- (no CPE)range: < 4.5.5_24-22.46.1
- (no CPE)range: < 4.7.5_02-43.30.1
- (no CPE)range: < 4.9.2_04-3.29.1
- (no CPE)range: < 4.4.4_30-61.26.1
- (no CPE)range: < 4.9.2_04-3.29.1
- (no CPE)range: < 4.5.5_24-22.46.1
- (no CPE)range: < 4.7.5_02-43.30.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
47- www.exploit-db.com/exploits/44697/mitreexploitx_refsource_EXPLOIT-DB
- www.exploit-db.com/exploits/45024/mitreexploitx_refsource_EXPLOIT-DB
- access.redhat.com/errata/RHSA-2018:1318mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1319mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1345mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1346mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1347mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1348mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1349mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1350mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1351mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1352mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1353mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1354mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1355mitrevendor-advisoryx_refsource_REDHAT
- access.redhat.com/errata/RHSA-2018:1524mitrevendor-advisoryx_refsource_REDHAT
- usn.ubuntu.com/3641-1/mitrevendor-advisoryx_refsource_UBUNTU
- usn.ubuntu.com/3641-2/mitrevendor-advisoryx_refsource_UBUNTU
- www.debian.org/security/2018/dsa-4196mitrevendor-advisoryx_refsource_DEBIAN
- www.debian.org/security/2018/dsa-4201mitrevendor-advisoryx_refsource_DEBIAN
- www.kb.cert.org/vuls/id/631579mitrethird-party-advisoryx_refsource_CERT-VN
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/mitrex_refsource_MISC
- openwall.com/lists/oss-security/2018/05/08/1mitrex_refsource_MISC
- openwall.com/lists/oss-security/2018/05/08/4mitrex_refsource_MISC
- www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-enmitrex_refsource_CONFIRM
- www.securityfocus.com/bid/104071mitrevdb-entryx_refsource_BID
- www.securitytracker.com/id/1040744mitrevdb-entryx_refsource_SECTRACK
- www.securitytracker.com/id/1040849mitrevdb-entryx_refsource_SECTRACK
- www.securitytracker.com/id/1040861mitrevdb-entryx_refsource_SECTRACK
- www.securitytracker.com/id/1040866mitrevdb-entryx_refsource_SECTRACK
- www.securitytracker.com/id/1040882mitrevdb-entryx_refsource_SECTRACK
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_MISC
- github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9mitrex_refsource_MISC
- help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0mitrex_refsource_CONFIRM
- lists.debian.org/debian-lts-announce/2018/05/msg00015.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2018/06/msg00000.htmlmitremailing-listx_refsource_MLIST
- lists.debian.org/debian-lts-announce/2018/11/msg00013.htmlmitremailing-listx_refsource_MLIST
- patchwork.kernel.org/patch/10386677/mitrex_refsource_MISC
- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897mitrex_refsource_CONFIRM
- security.netapp.com/advisory/ntap-20180927-0002/mitrex_refsource_CONFIRM
- support.apple.com/HT208742mitrex_refsource_MISC
- support.citrix.com/article/CTX234679mitrex_refsource_CONFIRM
- svnweb.freebsd.org/basemitrex_refsource_MISC
- www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.ascmitrex_refsource_MISC
- www.synology.com/support/security/Synology_SA_18_21mitrex_refsource_CONFIRM
- www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.htmlmitrex_refsource_MISC
- xenbits.xen.org/xsa/advisory-260.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.