{
  "threat_severity" : "Important",
  "public_date" : "2010-08-02T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: kvm: vmx: host GDT limit corruption",
    "id" : "1601849",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1601849"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-665",
  "details" : [ "A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.", "A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges." ],
  "acknowledgement" : "Red Hat would like to thank Vegard Nossum (Oracle Corporation) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2018-08-14T00:00:00Z",
    "advisory" : "RHSA-2018:2390",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-754.3.5.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.4 Advanced Update Support",
    "release_date" : "2018-08-14T00:00:00Z",
    "advisory" : "RHSA-2018:2394",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.4",
    "package" : "kernel-0:2.6.32-358.91.4.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.5 Advanced Update Support",
    "release_date" : "2018-08-14T00:00:00Z",
    "advisory" : "RHSA-2018:2393",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.5",
    "package" : "kernel-0:2.6.32-431.91.3.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.6 Advanced Update Support",
    "release_date" : "2018-08-14T00:00:00Z",
    "advisory" : "RHSA-2018:2392",
    "cpe" : "cpe:/o:redhat:rhel_aus:6.6",
    "package" : "kernel-0:2.6.32-504.72.4.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.6 Telco Extended Update Support",
    "release_date" : "2018-08-14T00:00:00Z",
    "advisory" : "RHSA-2018:2392",
    "cpe" : "cpe:/o:redhat:rhel_tus:6.6",
    "package" : "kernel-0:2.6.32-504.72.4.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.7 Extended Update Support",
    "release_date" : "2018-08-14T00:00:00Z",
    "advisory" : "RHSA-2018:2391",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.7",
    "package" : "kernel-0:2.6.32-573.60.4.el6"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-alt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "fix_state" : "Not affected",
    "package_name" : "realtime-kernel",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-10901\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-10901" ],
  "name" : "CVE-2018-10901",
  "csaw" : false
}