Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-1000255

Опубликовано: 30 окт. 2017
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 6.6
CVSS3: 5.5

Описание

On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value from the signal frame as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.

РелизСтатусПримечание
artful

released

4.13.0-17.20
devel

not-affected

4.13.0-17.20
esm-infra-legacy/trusty

not-affected

esm-infra/xenial

not-affected

precise/esm

not-affected

trusty

not-affected

trusty/esm

not-affected

upstream

released

4.14~rc5
vivid/ubuntu-core

not-affected

xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

esm-infra/xenial

not-affected

precise/esm

DNE

trusty

not-affected

trusty/esm

not-affected

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

4.15.0-1023.24~14.04.1
esm-infra/xenial

not-affected

ppc only
precise/esm

DNE

trusty

not-affected

4.15.0-1023.24~14.04.1
trusty/esm

not-affected

4.15.0-1023.24~14.04.1
upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

not-affected

ppc only

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

ppc only
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

not-affected

ppc only

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

not-affected

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

released

4.10.0-37.41~16.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

released

4.10.0-37.41~16.04.1

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

released

4.10.0-37.41~16.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

released

4.10.0-37.41~16.04.1

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

ignored

end of life
trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

not-affected

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [end of standard support]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [end of standard support]
upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
precise/esm

DNE

trusty

not-affected

trusty/esm

DNE

trusty was not-affected
upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [end of standard support]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [end of standard support]
upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

precise/esm

DNE

trusty

not-affected

trusty/esm

not-affected

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
xenial

not-affected

4.13.0-1008.9
zesty

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

РелизСтатусПримечание
artful

not-affected

ppc only
devel

not-affected

ppc only
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

ignored

end of life
xenial

not-affected

ppc only
zesty

not-affected

ppc only

Показывать по

РелизСтатусПримечание
artful

not-affected

ppc only
devel

not-affected

ppc only
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

not-affected

ppc only
zesty

not-affected

ppc only

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc5
vivid/ubuntu-core

DNE

xenial

DNE

zesty

DNE

Показывать по

EPSS

Процентиль: 15%
0.00048
Низкий

6.6 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
redhat
больше 8 лет назад

On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.

CVSS3: 5.5
nvd
больше 8 лет назад

On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.

CVSS3: 5.5
debian
больше 8 лет назад

On Linux running on PowerPC hardware (Power8 or later) a user process ...

CVSS3: 5.5
github
больше 3 лет назад

On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.

EPSS

Процентиль: 15%
0.00048
Низкий

6.6 Medium

CVSS2

5.5 Medium

CVSS3

Уязвимость CVE-2017-1000255