CVE-2018-8897

Public Exploit

Description

A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.

Category

7.8
CVSS
Severity: High
CVSS 3.0 •
CVSS 2.0 •
EPSS 15.77% Top 10%
Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory debian.org Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory debian.org Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory redhat.com Vendor Advisory ubuntu.com Vendor Advisory ubuntu.com Vendor Advisory microsoft.com
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
https://github.com/torvalds/linux/commit/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 third party advisory patch
http://openwall.com/lists/oss-security/2018/05/08/4 third party advisory mailing list
http://www.securitytracker.com/id/1040849 third party advisory vdb entry
http://www.securityfocus.com/bid/104071 third party advisory vdb entry
https://access.redhat.com/errata/RHSA-2018:1350 third party advisory vendor advisory
https://support.citrix.com/article/CTX234679 third party advisory
https://access.redhat.com/errata/RHSA-2018:1347 third party advisory vendor advisory
https://www.exploit-db.com/exploits/44697/ third party advisory vdb entry exploit
https://lists.debian.org/debian-lts-announce/2018/05/msg00015.html third party advisory mailing list
http://www.securitytracker.com/id/1040866 third party advisory vdb entry
https://lists.debian.org/debian-lts-announce/2018/11/msg00013.html mailing list
https://lists.debian.org/debian-lts-announce/2018/06/msg00000.html third party advisory mailing list
https://support.apple.com/HT208742 third party advisory
https://access.redhat.com/errata/RHSA-2018:1346 third party advisory vendor advisory
https://access.redhat.com/errata/RHSA-2018:1348 third party advisory vendor advisory
https://access.redhat.com/errata/RHSA-2018:1354 third party advisory vendor advisory
https://svnweb.freebsd.org/base?view=revision&revision=333368 third party advisory
https://www.debian.org/security/2018/dsa-4196 third party advisory vendor advisory
https://www.freebsd.org/security/advisories/FreeBSD-SA-18:06.debugreg.asc third party advisory
http://www.securitytracker.com/id/1040744 third party advisory vdb entry
https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html third party advisory
https://access.redhat.com/errata/RHSA-2018:1351 third party advisory vendor advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1567074 third party advisory issue tracking
https://xenbits.xen.org/xsa/advisory-260.html third party advisory patch
https://access.redhat.com/errata/RHSA-2018:1319 third party advisory vendor advisory
https://www.debian.org/security/2018/dsa-4201 third party advisory vendor advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
https://access.redhat.com/errata/RHSA-2018:1355 third party advisory vendor advisory
https://security.netapp.com/advisory/ntap-20180927-0002/
https://access.redhat.com/errata/RHSA-2018:1345 third party advisory vendor advisory
https://www.exploit-db.com/exploits/45024/ exploit
https://access.redhat.com/errata/RHSA-2018:1349 third party advisory vendor advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8897 patch vendor advisory third party advisory
https://access.redhat.com/errata/RHSA-2018:1352 third party advisory vendor advisory
https://access.redhat.com/errata/RHSA-2018:1318 third party advisory vendor advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 third party advisory patch
https://patchwork.kernel.org/patch/10386677/ third party advisory patch
https://www.kb.cert.org/vuls/id/631579 third party advisory
https://github.com/can1357/CVE-2018-8897/ third party advisory exploit
https://access.redhat.com/errata/RHSA-2018:1524 third party advisory vendor advisory
http://openwall.com/lists/oss-security/2018/05/08/1 third party advisory mailing list
http://www.securitytracker.com/id/1040861 third party advisory vdb entry
https://access.redhat.com/errata/RHSA-2018:1353 third party advisory vendor advisory
https://usn.ubuntu.com/3641-2/ third party advisory vendor advisory
https://www.synology.com/support/security/Synology_SA_18_21 third party advisory
http://www.securitytracker.com/id/1040882 third party advisory vdb entry
https://usn.ubuntu.com/3641-1/ third party advisory vendor advisory
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190921-01-debug-en

Frequently Asked Questions

What is the severity of CVE-2018-8897?
CVE-2018-8897 has been scored as a high severity vulnerability.
How to fix CVE-2018-8897?
To fix CVE-2018-8897, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2018-8897 being actively exploited in the wild?
It is possible that CVE-2018-8897 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~16% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.