In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.
References
Link | Resource |
---|---|
https://github.com/torvalds/linux/commit/727ba748e110b4de50d142edca9d6a9b7e6111d8 | Patch Third Party Advisory |
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.2 | Release Notes Vendor Advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1589 | Exploit Third Party Advisory |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=727ba748e110b4de50d142edca9d6a9b7e6111d8 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/44944/ | Exploit Third Party Advisory VDB Entry |
https://usn.ubuntu.com/3752-2/ | Third Party Advisory |
https://usn.ubuntu.com/3752-1/ | Third Party Advisory |
https://usn.ubuntu.com/3752-3/ | Third Party Advisory |
Information
Published : 2018-06-27 04:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-12904
Mitre link : CVE-2018-12904
JSON object : View
CWE
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel