A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. Upstream patch: --------------- -> https://git.kernel.org/linus/d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 Reference: ---------- -> http://www.openwall.com/lists/oss-security/2018/05/08/4
Acknowledgments: Name: Nick Peterson (Everdox Tech LLC), Andy Lutomirski
This issue was fixed for Fedora with the 4.16 rebases
Statement: This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7, and Red Hat Enterprise MRG 2 may address this issue.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:1318 https://access.redhat.com/errata/RHSA-2018:1318
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2018:1319 https://access.redhat.com/errata/RHSA-2018:1319
External References: https://access.redhat.com/security/vulnerabilities/pop_ss
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Extended Update Support Via RHSA-2018:1345 https://access.redhat.com/errata/RHSA-2018:1345
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.7 Extended Update Support Via RHSA-2018:1346 https://access.redhat.com/errata/RHSA-2018:1346
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Advanced Update Support Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions Red Hat Enterprise Linux 7.2 Telco Extended Update Support Via RHSA-2018:1347 https://access.redhat.com/errata/RHSA-2018:1347
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.4 Advanced Update Support Via RHSA-2018:1349 https://access.redhat.com/errata/RHSA-2018:1349
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.6 Advanced Update Support Red Hat Enterprise Linux 6.6 Telco Extended Update Support Via RHSA-2018:1351 https://access.redhat.com/errata/RHSA-2018:1351
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 Advanced Update Support Via RHSA-2018:1350 https://access.redhat.com/errata/RHSA-2018:1350
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Extended Update Support Via RHSA-2018:1348 https://access.redhat.com/errata/RHSA-2018:1348
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:1355 https://access.redhat.com/errata/RHSA-2018:1355
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2018:1354 https://access.redhat.com/errata/RHSA-2018:1354
This issue has been addressed in the following products: Red Hat Enterprise Linux 5.9 Long Life Via RHSA-2018:1352 https://access.redhat.com/errata/RHSA-2018:1352
This issue has been addressed in the following products: Red Hat Enterprise Linux 5 Extended Lifecycle Support Via RHSA-2018:1353 https://access.redhat.com/errata/RHSA-2018:1353
This issue has been addressed in the following products: Red Hat Virtualization 4 for RHEL-7 Via RHSA-2018:1524 https://access.redhat.com/errata/RHSA-2018:1524