Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hwr9-p63p-wq87

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.

EPSS

Процентиль: 26%
0.0009
Низкий

7.8 High

CVSS3

Дефекты

CWE-755

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.

CVSS3: 5.5
redhat
больше 8 лет назад

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.

CVSS3: 5.5
nvd
больше 7 лет назад

A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.

CVSS3: 5.5
debian
больше 7 лет назад

A flaw was found in the Linux kernel before version 4.12 in the way th ...

suse-cvrf
больше 8 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 26%
0.0009
Низкий

7.8 High

CVSS3

Дефекты

CWE-755