5.5
CVSSv3

CVE-2017-1000255

Published: 30/10/2017 Updated: 11/04/2018
CVSS v2 Base Score: 6.6 | Impact Score: 9.2 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 587
Vector: AV:L/AC:L/Au:N/C:N/I:C/A:C

Vulnerability Summary

On Linux running on PowerPC hardware (Power8 or later) a user process can craft a signal frame and then do a sigreturn so that the kernel will take an exception (interrupt), and use the r1 value *from the signal frame* as the kernel stack pointer. As part of the exception entry the content of the signal frame is written to the kernel stack, allowing an malicious user to overwrite arbitrary locations with arbitrary values. The exception handling does produce an oops, and a panic if panic_on_oops=1, but only after kernel memory has been over written. This flaw was introduced in commit: "5d176f751ee3 (powerpc: tm: Enable transactional memory (TM) lazily for userspace)" which was merged upstream into v4.9-rc1. Please note that kernels built with CONFIG_PPC_TRANSACTIONAL_MEM=n are not vulnerable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux_kernel -

Vendor Advisories

Synopsis Important: kernel-alt security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel-alt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Incorrect updates of uninstantiated keys crash the kernelA vulnerability was found in the key management subsystem of the Linux kernel An update on an uninstantiated key could cause a kernel panic, leading to denial of service (DoS) (CVE-2017-15299) Memory leak when merging buffers in SCSI IO vectorsIt was found that in the Linux kernel through v ...
A flaw was found in the Linux kernel's handling of signal frame on PowerPC systems A malicious local user process could craft a signal frame allowing an attacker to corrupt memory ...