In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.
Link | Tags |
---|---|
https://usn.ubuntu.com/3752-2/ | third party advisory vendor advisory |
https://github.com/torvalds/linux/commit/727ba748e110b4de50d142edca9d6a9b7e6111d8 | third party advisory patch |
https://usn.ubuntu.com/3752-3/ | third party advisory vendor advisory |
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.17.2 | release notes vendor advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1589 | third party advisory exploit |
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=727ba748e110b4de50d142edca9d6a9b7e6111d8 | patch vendor advisory |
https://usn.ubuntu.com/3752-1/ | third party advisory vendor advisory |
https://www.exploit-db.com/exploits/44944/ | third party advisory vdb entry exploit |