CVE-2018-8897 (CNNVD-201805-208)
中文标题:
多个厂商的操作系统竞争条件问题漏洞
英文标题:
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Develop...
漏洞描述
中文描述:
Linux kernel是美国等都是美国Linux(Linux)基金会的产品。Linux kernel是开源操作系统Linux所使用的内核。Qualcomm Kernel等都是美国高通(Qualcomm)公司的产品。Qualcomm Kernel是一个使用在高通产品中的内核组件。Apple Kernel等都是美国苹果(Apple)公司的产品。Apple Kernel是Apple设备的内核。 多个厂商的操作系统中存在竞争条件问题漏洞。该漏洞源于网络系统或产品在运行过程中,并发代码需要互斥地访问共享资源时,对于并发访问的处理不当。以下产品及版本受到影响:Linux(debian)7.0版本,8.0版本,9.0版本;Enterprise Linux Server 7.0版本;Enterprise Linux Workstation 7.0版本;Enterprise Virtualization Manager 3.0版本;Xenserver 6.0.2版本,6.2.0版本,6.5版本,7.0版本,7.1版本,7.2版本,7.3版本,7.4版本;Synology Skynas;Diskstation Manager 5.2版本,6.0版本,6.1版本;macOS 10.13.4之前版本;Xen;FreeBSD 11.0版本及之后版本(11.1版本已修复)。
英文描述:
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| debian | debian_linux | 7.0 | - | - |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 14.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 16.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
|
| canonical | ubuntu_linux | 17.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_virtualization_manager | 3.0 | - | - |
cpe:2.3:o:redhat:enterprise_virtualization_manager:3.0:*:*:*:*:*:*:*
|
| citrix | xenserver | 6.0.2 | - | - |
cpe:2.3:a:citrix:xenserver:6.0.2:*:*:*:*:*:*:*
|
| citrix | xenserver | 6.2.0 | - | - |
cpe:2.3:a:citrix:xenserver:6.2.0:*:*:*:*:*:*:*
|
| citrix | xenserver | 6.5 | - | - |
cpe:2.3:a:citrix:xenserver:6.5:*:*:*:*:*:*:*
|
| citrix | xenserver | 7.0 | - | - |
cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:*
|
| citrix | xenserver | 7.1 | - | - |
cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*
|
| citrix | xenserver | 7.2 | - | - |
cpe:2.3:a:citrix:xenserver:7.2:*:*:*:*:*:*:*
|
| citrix | xenserver | 7.3 | - | - |
cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:*
|
| citrix | xenserver | 7.4 | - | - |
cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:*
|
| synology | skynas | - | - | - |
cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*
|
| synology | diskstation_manager | 5.2 | - | - |
cpe:2.3:o:synology:diskstation_manager:5.2:*:*:*:*:*:*:*
|
| synology | diskstation_manager | 6.0 | - | - |
cpe:2.3:o:synology:diskstation_manager:6.0:*:*:*:*:*:*:*
|
| synology | diskstation_manager | 6.1 | - | - |
cpe:2.3:o:synology:diskstation_manager:6.1:*:*:*:*:*:*:*
|
| apple | mac_os_x | * | - | - |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
|
| xen | xen | - | - | - |
cpe:2.3:o:xen:xen:-:*:*:*:*:*:x86:*
|
| freebsd | freebsd | * | - | - |
cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
exploitdb
exploitdb
CVSS评分详情
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2018-8897 |
2025-11-11 15:19:55 | 2025-11-11 07:35:23 |
| NVD | nvd_CVE-2018-8897 |
2025-11-11 14:55:54 | 2025-11-11 07:43:57 |
| CNNVD | cnnvd_CNNVD-201805-208 |
2025-11-11 15:10:01 | 2025-11-11 07:53:44 |
| EXPLOITDB | exploitdb_EDB-44697 |
2025-11-11 15:05:53 | 2025-11-11 08:47:20 |
| EXPLOITDB | exploitdb_EDB-45024 |
2025-11-11 15:05:53 | 2025-11-11 08:47:50 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 51 -> 53
- tags_count: 3 -> 4
查看详细变更
- references_count: 48 -> 51
- tags_count: 0 -> 3
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 竞争条件问题
- cnnvd_id: 未提取 -> CNNVD-201805-208
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.8
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 24
- data_sources: ['cve'] -> ['cve', 'nvd']