CVE-2017-1000255

CVSS v3.0 5.5 (Medium)
55% Progress
CVSS v2.0 6.6 (Medium)
66% Progress
EPSS 0.05 % (21th)
0.05% Progress
Affected Products 3
Advisories 10

On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value from the signal frame as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an attacker to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.

Weaknesses
CWE-787
Out-of-bounds Write
CVE Status
PUBLISHED
CNA
MITRE
Published Date
2017-10-30 20:29:00
(6 years ago)
Updated Date
2018-04-11 01:29:00
(6 years ago)

Affected Products

Loading...
Loading...

Configuration #1

AND
    CPE23 From Up To
OR  
  Linux Kernel cpe:2.3:o:linux:linux_kernel:-
OR  
  Running on/with
  Ibm Powerpc Power8 cpe:2.3:h:ibm:powerpc_power8:-
OR  
  Running on/with
  Ibm Powerpc Power9 cpe:2.3:h:ibm:powerpc_power9:-
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...