In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.
References
Configurations
History
21 Nov 2024, 03:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=727ba748e110b4de50d142edca9d6a9b7e6111d8 - Patch, Vendor Advisory | |
References | () https://bugs.chromium.org/p/project-zero/issues/detail?id=1589 - Exploit, Third Party Advisory | |
References | () https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.2 - Release Notes, Vendor Advisory | |
References | () https://github.com/torvalds/linux/commit/727ba748e110b4de50d142edca9d6a9b7e6111d8 - Patch, Third Party Advisory | |
References | () https://usn.ubuntu.com/3752-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3752-2/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/3752-3/ - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44944/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-06-27 11:29
Updated : 2024-11-21 03:46
NVD link : CVE-2018-12904
Mitre link : CVE-2018-12904
CVE.ORG link : CVE-2018-12904
JSON object : View
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel
CWE