Reachable Assertion Affecting kernel package, versions <0:3.10.0-693.25.2.el7
Threat Intelligence
EPSS
0.06% (30th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-KERNEL-4859659
- published 26 Jul 2021
- disclosed 15 Sep 2017
Introduced: 15 Sep 2017
CVE-2017-1000252 Open this link in a new tabHow to fix?
Upgrade RHEL:7
kernel
to version 0:3.10.0-693.25.2.el7 or higher.
This issue was patched in RHSA-2018:1130
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel
package and not the kernel
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
The KVM subsystem in the Linux kernel through 4.13.3 allows guest OS users to cause a denial of service (assertion failure, and hypervisor hang or crash) via an out-of bounds guest_irq value, related to arch/x86/kvm/vmx.c and virt/kvm/eventfd.c.
References
- http://www.securityfocus.com/bid/101022
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=36ae3c0a36b7456432fedce38ae2f7bd3e01a563
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
- https://bugzilla.redhat.com/show_bug.cgi?id=1490781
- https://github.com/torvalds/linux/commit/36ae3c0a36b7456432fedce38ae2f7bd3e01a563
- https://github.com/torvalds/linux/commit/3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
- https://marc.info/?l=kvm&m=150549145711115&w=2
- https://marc.info/?l=kvm&m=150549146311117&w=2
- http://www.openwall.com/lists/oss-security/2017/09/15/4
- https://access.redhat.com/security/cve/CVE-2017-1000252
- http://www.debian.org/security/2017/dsa-3981
- https://access.redhat.com/errata/RHSA-2018:1130