First published: Fri Jun 23 2017(Updated: )
A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Server Aus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.4 | |
Redhat Enterprise Linux Server Eus | =7.5 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Linux Linux kernel | <4.12 | |
redhat/kernel | <4.12 | 4.12 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.12.5-1 6.12.6-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7518 is a vulnerability found in the Linux kernel before version 4.12 that affects the KVM module.
CVE-2017-7518 has a severity level of medium.
Linux kernel versions before 4.12 are affected by CVE-2017-7518.
CVE-2017-7518 can be exploited by a user or process inside a guest using the trap flag (TF) bit in EFLAGS during the emulation of the syscall instruction.
Yes, the fix for CVE-2017-7518 is available in the Linux kernel version 4.12 and later.