7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
AI Score
Confidence
High
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.974 High
EPSS
Percentile
99.9%
Jann Horn discovered that microprocessors utilizing speculative execution
and indirect branch prediction may allow unauthorized memory reads via
sidechannel attacks. This flaw is known as Meltdown. A local attacker could
use this to expose sensitive information, including kernel memory.
(CVE-2017-5754)
Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation
in the Linux kernel did not properly check the relationship between pointer
values and the BPF stack. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2017-17863)
Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation
in the Linux kernel improperly performed sign extension in some situations.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2017-16995)
Alexei Starovoitov discovered that the Berkeley Packet Filter (BPF)
implementation in the Linux kernel contained a branch-pruning logic issue
around unreachable code. A local attacker could use this to cause a denial
of service. (CVE-2017-17862)
Jann Horn discovered that the Berkeley Packet Filter (BPF) implementation
in the Linux kernel mishandled pointer data values in some situations. A
local attacker could use this to to expose sensitive information (kernel
memory). (CVE-2017-17864)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 17.10 | noarch | linux-image-4.13.0-25-lowlatency | < 4.13.0-25.29 | UNKNOWN |
Ubuntu | 17.10 | noarch | block-modules-4.13.0-25-generic-di | < 4.13.0-25.29 | UNKNOWN |
Ubuntu | 17.10 | noarch | crypto-modules-4.13.0-25-generic-di | < 4.13.0-25.29 | UNKNOWN |
Ubuntu | 17.10 | noarch | fat-modules-4.13.0-25-generic-di | < 4.13.0-25.29 | UNKNOWN |
Ubuntu | 17.10 | noarch | fb-modules-4.13.0-25-generic-di | < 4.13.0-25.29 | UNKNOWN |
Ubuntu | 17.10 | noarch | firewire-core-modules-4.13.0-25-generic-di | < 4.13.0-25.29 | UNKNOWN |
Ubuntu | 17.10 | noarch | floppy-modules-4.13.0-25-generic-di | < 4.13.0-25.29 | UNKNOWN |
Ubuntu | 17.10 | noarch | fs-core-modules-4.13.0-25-generic-di | < 4.13.0-25.29 | UNKNOWN |
Ubuntu | 17.10 | noarch | fs-secondary-modules-4.13.0-25-generic-di | < 4.13.0-25.29 | UNKNOWN |
Ubuntu | 17.10 | noarch | input-modules-4.13.0-25-generic-di | < 4.13.0-25.29 | UNKNOWN |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
AI Score
Confidence
High
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.974 High
EPSS
Percentile
99.9%