In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.
References
Link | Resource |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=727ba748e110b4de50d142edca9d6a9b7e6111d8 | Patch Vendor Advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1589 | Exploit Third Party Advisory |
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.2 | Release Notes Vendor Advisory |
https://github.com/torvalds/linux/commit/727ba748e110b4de50d142edca9d6a9b7e6111d8 | Patch Third Party Advisory |
https://usn.ubuntu.com/3752-1/ | Third Party Advisory |
https://usn.ubuntu.com/3752-2/ | Third Party Advisory |
https://usn.ubuntu.com/3752-3/ | Third Party Advisory |
https://www.exploit-db.com/exploits/44944/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2018-06-27 11:29
Updated : 2019-10-03 00:03
NVD link : CVE-2018-12904
Mitre link : CVE-2018-12904
CVE.ORG link : CVE-2018-12904
JSON object : View
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel
CWE