Oval Definition:oval:com.ubuntu.xenial:def:20177518000
Revision Date:2018-07-30Version:1
Title:CVE-2017-7518 on Ubuntu 16.04 LTS (xenial) - medium.
Description:A flaw was found in the Linux kernel before version 4.12 in the way the KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(#DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Linux guests are not affected by this. Andy Lutomirski discovered that the KVM implementation in the Linux kernel was vulnerable to a debug exception error when single-stepping through a syscall. A local attacker in a non-Linux guest vm could possibly use this to gain administrative privileges in the guest vm.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2017-7518
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • The 'linux' package in xenial was vulnerable but has been fixed (note: '4.4.0-119.143').
  • OR The 'linux-aws' package in xenial was vulnerable but has been fixed (note: '4.4.0-1054.63').
  • OR NOT While related to the CVE in some way, the 'linux-azure' package in xenial is not affected (note: '4.11.0-1009.9').
  • OR NOT While related to the CVE in some way, the 'linux-azure-edge' package in xenial is not affected (note: '4.15.0-1002.2').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed ESM criteria').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR The 'linux-gcp' package in xenial was vulnerable but has been fixed (note: '4.13.0-1002.5').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed now end-of-life').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needed now end-of-life').
  • OR The 'linux-hwe' package in xenial was vulnerable but has been fixed (note: '4.13.0-26.29~16.04.2').
  • OR The 'linux-hwe-edge' package in xenial was vulnerable but has been fixed (note: '4.13.0-26.29~16.04.2').
  • OR The 'linux-kvm' package in xenial was vulnerable but has been fixed (note: '4.4.0-1020.25').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR NOT While related to the CVE in some way, the 'linux-oem' package in xenial is not affected (note: '4.13.0-1008.9').
  • OR The 'linux-raspi2' package in xenial was vulnerable but has been fixed (note: '4.4.0-1086.94').
  • OR The 'linux-snapdragon' package in xenial was vulnerable but has been fixed (note: '4.4.0-1088.93').
  • BACK