Vulnerability Details : CVE-2017-1000252
The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2017-1000252
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-1000252
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 26 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-1000252
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:N/A:P |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2017-1000252
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
-
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-1000252
-
http://www.debian.org/security/2017/dsa-3981
Debian -- Security Information -- DSA-3981-1 linux
-
https://marc.info/?l=kvm&m=150549145711115&w=2
'[PATCH 1/2] KVM: VMX: Do not BUG() on out-of-bounds guest IRQ' - MARCMailing List;Patch;Third Party Advisory
-
https://github.com/torvalds/linux/commit/3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
KVM: VMX: Do not BUG() on out-of-bounds guest IRQ · torvalds/linux@3a8b067 · GitHubIssue Tracking;Patch;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:1130
RHSA-2018:1130 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2018:0676
RHSA-2018:0676 - Security Advisory - Red Hat Customer Portal
-
https://access.redhat.com/errata/RHSA-2018:1062
RHSA-2018:1062 - Security Advisory - Red Hat Customer Portal
-
http://www.openwall.com/lists/oss-security/2017/09/15/4
oss-security - CVE-2017-1000252: KVM denial of service with posted interrupts on Intel systems (since Linux 4.4)Mailing List;Patch;Third Party Advisory
-
https://marc.info/?l=kvm&m=150549146311117&w=2
'[PATCH 2/2] KVM: Don't accept obviously wrong gsi values via KVM_IRQFD' - MARCMailing List;Patch;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1490781
1490781 – (CVE-2017-1000252) CVE-2017-1000252 kernel: kvm: Reachable BUG() on out-of-bounds guest IRQIssue Tracking;Patch;Third Party Advisory
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
kernel/git/torvalds/linux.git - Linux kernel source treeIssue Tracking;Patch;Third Party Advisory
-
https://github.com/torvalds/linux/commit/36ae3c0a36b7456432fedce38ae2f7bd3e01a563
KVM: Don't accept obviously wrong gsi values via KVM_IRQFD · torvalds/linux@36ae3c0 · GitHubIssue Tracking;Patch;Third Party Advisory
-
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=36ae3c0a36b7456432fedce38ae2f7bd3e01a563
kernel/git/torvalds/linux.git - Linux kernel source treeIssue Tracking;Patch;Third Party Advisory
-
http://www.securityfocus.com/bid/101022
Linux Kernel CVE-2017-1000252 Multiple Local Denial of Service Vulnerabilities
Jump to