A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
References
| Link | Resource |
|---|---|
| https://www.spinics.net/lists/kvm/msg151817.html | Mailing List Patch |
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7518 | Issue Tracking Patch Third Party Advisory |
| https://access.redhat.com/articles/3290921 | Permissions Required Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2017/06/23/5 | Mailing List Patch Third Party Advisory |
| https://www.debian.org/security/2017/dsa-3981 | Third Party Advisory |
| https://usn.ubuntu.com/3619-2/ | Third Party Advisory |
| https://usn.ubuntu.com/3619-1/ | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2018:0412 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2018:0395 | Third Party Advisory |
| http://www.securitytracker.com/id/1038782 | Third Party Advisory VDB Entry |
| http://www.securityfocus.com/bid/99263 | Third Party Advisory VDB Entry |
| https://usn.ubuntu.com/3754-1/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2018-07-30 15:29
Updated : 2019-10-09 23:29
NVD link : CVE-2017-7518
Mitre link : CVE-2017-7518
JSON object : View
Products Affected
canonical
- ubuntu_linux
debian
- debian_linux
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_server_aus
- enterprise_linux
- enterprise_linux_server_eus
linux
- linux_kernel
CWE
CWE-755
Improper Handling of Exceptional Conditions
