An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-07-28T18:00:00
Updated: 2024-08-05T09:38:13.045Z
Reserved: 2018-07-28T00:00:00
Link: CVE-2018-14678
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-07-28T18:29:00.243
Modified: 2024-11-21T03:49:34.110
Link: CVE-2018-14678
Redhat