Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7518

Опубликовано: 30 июл. 2018
Источник: debian
EPSS Низкий

Описание

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.11.11-1package
linuxnot-affectedwheezypackage

Примечания

  • https://www.openwall.com/lists/oss-security/2017/06/23/5

  • https://www.spinics.net/lists/kvm/msg151817.html

  • https://bugzilla.redhat.com/show_bug.cgi?id=1464473

  • Fixed by: https://git.kernel.org/linus/c8401dda2f0a00cd25c0af6a95ed50e478d25de4

EPSS

Процентиль: 26%
0.0009
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.

CVSS3: 5.5
redhat
больше 8 лет назад

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.

CVSS3: 5.5
nvd
больше 7 лет назад

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.

CVSS3: 7.8
github
больше 3 лет назад

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.

suse-cvrf
больше 8 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 26%
0.0009
Низкий