CVE-2018-10872

MEDIUM

Redhat Enterprise Linux - Denial of Service

Title source: rule

Description

A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897 in Red Hat Enterprise Linux 6.10 GA kernel. No other versions are affected by this CVE.

Scores

CVSS v3 6.5
EPSS 0.0008
EPSS Percentile 23.5%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Classification

CWE
CWE-119 CWE-250
Status published

Affected Products (4)

redhat/enterprise_linux
redhat/enterprise_linux_desktop
redhat/enterprise_linux_server
redhat/enterprise_linux_workstation

Timeline

Published Jul 10, 2018
Tracked Since Feb 18, 2026