arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-15594.json"
[
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"76859433015778263308071649065550667591",
"332597304686077798256091275048687402173",
"4951779067109994549845401040592108347",
"257763629745612903677294664523011165652",
"263838824309409253059063573076277516762",
"68907433362624629442759495793309449387",
"167435345330119887122888523105984107924",
"19104846687652226866478982435494729002",
"54279818283506992370564668412044085405",
"84310599506901565531905373548114670633",
"315248580906885322394354761400967655414",
"226322824612889444152372668735182351826"
],
"threshold": 0.9
},
"signature_type": "Line",
"id": "CVE-2018-15594-64b3e93d",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@5800dc5c19f34e6e03b5adab1282535cb102fafd",
"target": {
"file": "arch/x86/kernel/paravirt.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"length": 284.0,
"function_hash": "27271065913656130281626683359801487313"
},
"signature_type": "Function",
"id": "CVE-2018-15594-6659efd1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@5800dc5c19f34e6e03b5adab1282535cb102fafd",
"target": {
"function": "paravirt_patch_jmp",
"file": "arch/x86/kernel/paravirt.c"
}
},
{
"signature_version": "v1",
"deprecated": false,
"digest": {
"length": 394.0,
"function_hash": "330343751289802225723189033564259192915"
},
"signature_type": "Function",
"id": "CVE-2018-15594-90cf7e5a",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@5800dc5c19f34e6e03b5adab1282535cb102fafd",
"target": {
"function": "paravirt_patch_call",
"file": "arch/x86/kernel/paravirt.c"
}
}
]