CVE-2017-13695 PUBLISHED

The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.

EPSS 0.01% · 2.0th percentile

Risk Scores

EPSS Score
0.01%
2.0th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSlinux-aws0, 4.15.0-1001.1, 4.15.0-1003.3
Ubuntu:24.04:LTSlinux-hwe-6.116.11.0-29.29~24.04.1, 0, 6.11.0-17.17~24.04.2
Ubuntu:16.04:LTSlinux-raspi24.4.0-1057.64, 4.4.0-1080.88, 4.4.0-1079.87
Ubuntu:22.04:LTSlinux-intel-iot-realtime5.15.0-1073.75, 0
Ubuntu:18.04:LTSlinux-oem4.15.0-1015.18, 4.15.0-1013.16, 4.15.0-1012.15
Ubuntu:18.04:LTSlinux-snapdragon4.4.0-1078.83, 0, 4.4.0-1079.84
Ubuntu:18.04:LTSlinux-gcp0, 4.15.0-1018.19, 4.15.0-1017.18
Ubuntu:18.04:LTSlinux-kvm4.15.0-1020.20, 4.15.0-1019.19, 4.15.0-1017.17
Ubuntu:14.04:LTSlinux-aws4.4.0-1009.9, 4.4.0-1023.23, 4.4.0-1022.22
Ubuntu:18.04:LTSlinux0, 4.15.0-30.32, 4.15.0-29.31
Ubuntu:24.04:LTSlinux-azure-6.116.11.0-1017.17~24.04.1, 6.11.0-1014.14~24.04.1, 6.11.0-1015.15~24.04.1
Ubuntu:16.04:LTSlinux-gcp0, 4.13.0-1011.15, 4.13.0-1012.16
Ubuntu:16.04:LTSlinux-hwe4.8.0-58.63~16.04.1, 4.10.0-27.30~16.04.2, 4.10.0-28.32~16.04.2
Ubuntu:22.04:LTSlinux-riscv5.15.0-1004.4, 5.13.0-1010.11+22.04.1, 5.13.0-1007.7+22.04.1
Ubuntu:Pro:14.04:LTSlinux3.13.0-193.244, 3.13.0-194.245, 3.13.0-195.246
Ubuntu:16.04:LTSlinux4.4.0-127.153, 0, 4.2.0-16.19
Ubuntu:24.04:LTSlinux-gcp-6.116.11.0-1013.13~24.04.1, 6.11.0-1011.11~24.04.1, 6.11.0-1006.6~24.04.2
Ubuntu:14.04:LTSlinux-lts-xenial4.4.0-111.134~14.04.1, 4.4.0-109.132~14.04.1, 4.4.0-108.131~14.04.1
Ubuntu:24.04:LTSlinux-lowlatency-hwe-6.116.11.0-1015.16~24.04.2, 6.11.0-1014.15~24.04.1, 6.11.0-1013.14~24.04.1
Ubuntu:20.04:LTSlinux-riscv5.4.0-30.34, 5.4.0-40.45, 5.4.0-39.44

…and 13 more

Timeline

References

Open in Interactive Console →