A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.
2018-07-26T17:29:00.893
2024-11-21T03:42:15.617
Modified
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 2.6.36 | Yes |
Operating System | redhat | enterprise_linux_desktop | 6.0 | Yes |
Operating System | redhat | enterprise_linux_server | 6.0 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 6.4 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 6.5 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 6.6 | Yes |
Operating System | redhat | enterprise_linux_workstation | 6.0 | Yes |