An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xenfailsafecallback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (uninitialized memory usage and system crash). Within Xen, 64-bit x86 PV Linux guest OS users can trigger a guest OS crash or possibly gain privileges.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-14678.json"
[
{
"events": [
{
"introduced": "4.14.21"
},
{
"fixed": "4.14.61"
}
]
},
{
"events": [
{
"introduced": "4.15.5"
},
{
"fixed": "4.17.13"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.11.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "14.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
}
]