Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity High
Privileges Required Low
Scope Changed
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
Attack Vector Local
Attack Complexity High
Privileges Required Low
Scope Changed
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.9089.
Exploitation poc
Automatable no
Technical Impact partial
Affected Vendors & Products
| Vendors | Products |
|---|---|
| Arm |
|
| Canonical |
|
| Debian |
|
| Intel |
|
| Netapp |
|
| Oracle |
|
| Redhat |
|
| Siemens |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
|
Configuration 4 [-]
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
|
Configuration 7 [-]
|
| Package | CPE | Advisory | Released Date |
|---|---|---|---|
| Red Hat Enterprise Linux 5.9 Long Life | |||
| kernel-0:2.6.18-348.39.1.el5 | cpe:/o:redhat:rhel_aus:5.9 | RHSA-2018:1252 | 2018-04-25T00:00:00Z |
| Red Hat Enterprise Linux 5 Extended Lifecycle Support | |||
| kernel-0:2.6.18-430.el5 | cpe:/o:redhat:rhel_els:5 | RHSA-2018:1196 | 2018-04-23T00:00:00Z |
| Red Hat Enterprise Linux 6 | |||
| kernel-0:2.6.32-696.28.1.el6 | cpe:/o:redhat:enterprise_linux:6 | RHSA-2018:1319 | 2018-05-08T00:00:00Z |
| Red Hat Enterprise Linux 6.2 Advanced Update Support | |||
| kernel-0:2.6.32-220.76.2.el6 | cpe:/o:redhat:rhel_mission_critical:6.2 | RHSA-2018:0020 | 2018-01-04T00:00:00Z |
| Red Hat Enterprise Linux 6.4 Advanced Update Support | |||
| kernel-0:2.6.32-358.84.2.el6 | cpe:/o:redhat:rhel_aus:6.4 | RHSA-2018:0018 | 2018-01-04T00:00:00Z |
| Red Hat Enterprise Linux 6.5 Advanced Update Support | |||
| kernel-0:2.6.32-431.85.2.el6 | cpe:/o:redhat:rhel_aus:6.5 | RHSA-2018:0022 | 2018-01-04T00:00:00Z |
| Red Hat Enterprise Linux 6.6 Advanced Update Support | |||
| kernel-0:2.6.32-504.64.4.el6 | cpe:/o:redhat:rhel_aus:6.6 | RHSA-2018:0017 | 2018-01-04T00:00:00Z |
| Red Hat Enterprise Linux 6.6 Telco Extended Update Support | |||
| kernel-0:2.6.32-504.64.4.el6 | cpe:/o:redhat:rhel_tus:6.6 | RHSA-2018:0017 | 2018-01-04T00:00:00Z |
| Red Hat Enterprise Linux 6.7 Extended Update Support | |||
| kernel-0:2.6.32-573.55.2.el6 | cpe:/o:redhat:rhel_eus:6.7 | RHSA-2018:1346 | 2018-05-08T00:00:00Z |
| Red Hat Enterprise Linux 7 | |||
| kernel-rt-0:3.10.0-693.11.1.rt56.639.el7 | cpe:/a:redhat:rhel_extras_rt:7 | RHSA-2018:0016 | 2018-01-04T00:00:00Z |
| dracut-0:033-502.el7_4.1 | cpe:/o:redhat:enterprise_linux:7 | RHBA-2018:0042 | 2018-01-04T00:00:00Z |
| qemu-kvm-ma-10:2.10.0-21.el7 | cpe:/o:redhat:enterprise_linux:7 | RHBA-2018:0831 | 2018-04-10T00:00:00Z |
| microcode_ctl-2:2.1-29.el7 | cpe:/o:redhat:enterprise_linux:7 | RHEA-2018:0690 | 2018-04-10T00:00:00Z |
| libvirt-0:3.9.0-14.el7 | cpe:/o:redhat:enterprise_linux:7 | RHEA-2018:0704 | 2018-04-10T00:00:00Z |
| linux-firmware-0:20180220-62.git6d51311.el7 | cpe:/o:redhat:enterprise_linux:7 | RHEA-2018:0874 | 2018-04-10T00:00:00Z |
| qemu-kvm-10:1.5.3-141.el7_4.6 | cpe:/o:redhat:enterprise_linux:7 | RHSA-2018:0023 | 2018-01-04T00:00:00Z |
| kernel-0:3.10.0-862.el7 | cpe:/o:redhat:enterprise_linux:7 | RHSA-2018:1062 | 2018-04-10T00:00:00Z |
| kernel-alt-0:4.14.0-49.8.1.el7a | cpe:/o:redhat:enterprise_linux:7 | RHSA-2018:1967 | 2018-06-26T00:00:00Z |
| Red Hat Enterprise Linux 7.2 Advanced Update Support | |||
| kernel-0:3.10.0-327.66.1.el7 | cpe:/o:redhat:rhel_aus:7.2 | RHSA-2018:1216 | 2018-04-24T00:00:00Z |
| Red Hat Enterprise Linux 7.2 Telco Extended Update Support | |||
| kernel-0:3.10.0-327.66.1.el7 | cpe:/o:redhat:rhel_tus:7.2 | RHSA-2018:1216 | 2018-04-24T00:00:00Z |
| Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions | |||
| kernel-0:3.10.0-327.66.1.el7 | cpe:/o:redhat:rhel_e4s:7.2 | RHSA-2018:1216 | 2018-04-24T00:00:00Z |
| Red Hat Enterprise Linux 7.3 Extended Update Support | |||
| qemu-kvm-10:1.5.3-126.el7_3.13 | cpe:/o:redhat:rhel_eus:7.3 | RHSA-2018:0027 | 2018-01-04T00:00:00Z |
| kernel-0:3.10.0-514.48.1.el7 | cpe:/o:redhat:rhel_eus:7.3 | RHSA-2018:1129 | 2018-04-17T00:00:00Z |
| Red Hat Enterprise Linux 7.4 Extended Update Support | |||
| kernel-0:3.10.0-693.25.2.el7 | cpe:/o:redhat:rhel_eus:7.4 | RHSA-2018:1130 | 2018-04-17T00:00:00Z |
| Red Hat Enterprise MRG 2 | |||
| kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt | cpe:/a:redhat:enterprise_mrg:2:server:el6 | RHSA-2018:0021 | 2018-01-04T00:00:00Z |
| RHEV 3.X Hypervisor and Agents for RHEL-7 ELS | |||
| qemu-kvm-rhev-10:2.6.0-28.el7_3.15 | cpe:/o:redhat:enterprise_linux:7::hypervisor | RHSA-2018:0028 | 2018-01-04T00:00:00Z |
No data.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1349-1 | linux-tools security update |
Debian DLA |
DLA-1362-1 | gcc-4.9-backport new package |
Debian DLA |
DLA-1369-1 | linux security update |
Debian DLA |
DLA-1422-1 | linux security update |
Debian DLA |
DLA-1422-2 | linux security update |
Debian DLA |
DLA-1497-1 | qemu security update |
Debian DLA |
DLA-1506-1 | intel-microcode security update |
Debian DLA |
DLA-2148-1 | amd64-microcode security update |
Debian DLA |
DLA-2323-1 | linux-4.19 new package |
Debian DLA |
DLA-2743-1 | amd64-microcode security update |
Debian DLA |
DLA-2743-2 | amd64-microcode update |
Debian DSA |
DSA-4120-1 | linux security update |
Debian DSA |
DSA-4179-1 | linux-tools security update |
Debian DSA |
DSA-4187-1 | linux security update |
Debian DSA |
DSA-4188-1 | linux security update |
Debian DSA |
DSA-4213-1 | qemu security update |
Debian DSA |
DSA-4469-1 | libvirt security update |
Ubuntu USN |
USN-3516-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-3530-1 | WebKitGTK+ vulnerabilities |
Ubuntu USN |
USN-3531-1 | Intel Microcode update |
Ubuntu USN |
USN-3531-3 | intel-microcode update |
Ubuntu USN |
USN-3540-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3540-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3541-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3541-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3542-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3542-2 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3549-1 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-3560-1 | QEMU update |
Ubuntu USN |
USN-3561-1 | libvirt update |
Ubuntu USN |
USN-3580-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3581-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3581-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3582-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3582-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3594-1 | Linux kernel vulnerability |
Ubuntu USN |
USN-3597-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3597-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3620-2 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3690-1 | AMD Microcode update |
Ubuntu USN |
USN-3777-3 | Linux kernel (Azure) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 06 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 20 Mar 2025 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:/o:redhat:enterprise_linux:7::hypervisor |
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2025-05-06T14:59:36.405Z
Reserved: 2017-02-01T00:00:00.000Z
Link: CVE-2017-5715
Updated: 2024-08-05T15:11:48.456Z
Status : Modified
Published: 2018-01-04T13:29:00.227
Modified: 2025-05-06T15:15:51.640
Link: CVE-2017-5715
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN