Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1091

Опубликовано: 27 мар. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.9
CVSS3: 5.5

Описание

In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.

РелизСтатусПримечание
artful

released

4.13.0-17.20
devel

not-affected

4.13.0-17.20
esm-infra-legacy/trusty

not-affected

esm-infra/xenial

not-affected

precise/esm

ignored

end of life, was needs-triage
trusty

not-affected

trusty/esm

not-affected

upstream

released

4.14~rc2
xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

devel

not-affected

4.15.0-1001.1
esm-infra-legacy/trusty

not-affected

esm-infra/xenial

not-affected

precise/esm

DNE

trusty

not-affected

trusty/esm

not-affected

upstream

released

4.14~rc2
xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

devel

not-affected

4.15.0-1002.2
esm-infra-legacy/trusty

not-affected

4.15.0-1023.24~14.04.1
esm-infra/xenial

not-affected

4.13.0-1005.7
precise/esm

DNE

trusty

not-affected

4.15.0-1023.24~14.04.1
trusty/esm

not-affected

4.15.0-1023.24~14.04.1
upstream

released

4.14~rc2
xenial

not-affected

4.13.0-1005.7

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc2
xenial

ignored

end of standard support, was needs-triage

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc2
xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
artful

DNE

devel

not-affected

4.15.0-1001.1
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

4.13.0-1002.5
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc2
xenial

not-affected

4.13.0-1002.5

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc2
xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc2
xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

4.13.0-26.29~16.04.2
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc2
xenial

not-affected

4.13.0-26.29~16.04.2

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

4.13.0-26.29~16.04.2
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc2
xenial

not-affected

4.13.0-26.29~16.04.2

Показывать по

РелизСтатусПримечание
artful

DNE

devel

not-affected

4.15.0-1002.2
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc2
xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

not-affected

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [end of standard support]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [end of standard support]
upstream

released

4.14~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [end of standard support]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [end of standard support]
upstream

released

4.14~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [end of standard support]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [end of standard support]
upstream

released

4.14~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

precise/esm

DNE

trusty

not-affected

trusty/esm

not-affected

upstream

released

4.14~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc2
xenial

ignored

end of standard support

Показывать по

РелизСтатусПримечание
artful

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored [abandoned]]
precise/esm

DNE

trusty

ignored

end of standard support
trusty/esm

DNE

trusty was ignored [abandoned]
upstream

released

4.14~rc2
xenial

DNE

Показывать по

РелизСтатусПримечание
artful

DNE

devel

not-affected

4.15.0-1001.2
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc2
xenial

not-affected

4.13.0-1008.9

Показывать по

РелизСтатусПримечание
artful

released

4.13.0-1006.6
devel

not-affected

4.13.0-1006.6
esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc2
xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

not-affected

devel

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

4.14~rc2
xenial

not-affected

Показывать по

EPSS

Процентиль: 16%
0.00051
Низкий

4.9 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
redhat
почти 8 лет назад

In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.

CVSS3: 5.5
nvd
около 7 лет назад

In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.

CVSS3: 5.5
debian
около 7 лет назад

In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c ...

CVSS3: 5.5
github
около 3 лет назад

In the flush_tmregs_to_thread function in arch/powerpc/kernel/ptrace.c in the Linux kernel before 4.13.5, a guest kernel crash can be triggered from unprivileged userspace during a core dump on a POWER host due to a missing processor feature check and an erroneous use of transactional memory (TM) instructions in the core dump path, leading to a denial of service.

suse-cvrf
около 7 лет назад

Security update for the Linux Kernel

EPSS

Процентиль: 16%
0.00051
Низкий

4.9 Medium

CVSS2

5.5 Medium

CVSS3