A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2017/06/23/5 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/99263 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038782 | Third Party Advisory VDB Entry |
https://access.redhat.com/articles/3290921 | Permissions Required Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0395 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0412 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7518 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/3619-1/ | Third Party Advisory |
https://usn.ubuntu.com/3619-2/ | Third Party Advisory |
https://usn.ubuntu.com/3754-1/ | Third Party Advisory |
https://www.debian.org/security/2017/dsa-3981 | Third Party Advisory |
https://www.spinics.net/lists/kvm/msg151817.html | Mailing List Patch |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2018-07-30T13:00:00
Updated: 2018-08-24T09:57:01
Reserved: 2017-04-05T00:00:00
Link: CVE-2017-7518
JSON object: View
NVD Information
Status : Modified
Published: 2018-07-30T15:29:00.560
Modified: 2023-11-07T02:50:11.623
Link: CVE-2017-7518
JSON object: View
Redhat Information
No data.