The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://usn.ubuntu.com/3617-1/ | vendor-advisory x_refsource_UBUNTU |
| https://usn.ubuntu.com/3619-2/ | vendor-advisory x_refsource_UBUNTU |
| https://www.debian.org/security/2018/dsa-4082 | vendor-advisory x_refsource_DEBIAN |
| https://usn.ubuntu.com/3617-3/ | vendor-advisory x_refsource_UBUNTU |
| https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html | mailing-list x_refsource_MLIST |
| https://usn.ubuntu.com/3632-1/ | vendor-advisory x_refsource_UBUNTU |
| http://www.securityfocus.com/bid/102227 | vdb-entry x_refsource_BID |
| https://usn.ubuntu.com/3620-2/ | vendor-advisory x_refsource_UBUNTU |
| https://www.spinics.net/lists/kvm/msg160796.html | x_refsource_MISC |
| https://www.debian.org/security/2017/dsa-4073 | vendor-advisory x_refsource_DEBIAN |
| https://usn.ubuntu.com/3617-2/ | vendor-advisory x_refsource_UBUNTU |
| https://usn.ubuntu.com/3620-1/ | vendor-advisory x_refsource_UBUNTU |
| https://usn.ubuntu.com/3619-1/ | vendor-advisory x_refsource_UBUNTU |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://usn.ubuntu.com/3617-1/ | vendor-advisory x_refsource_UBUNTU x_transferred |
| https://usn.ubuntu.com/3619-2/ | vendor-advisory x_refsource_UBUNTU x_transferred |
| https://www.debian.org/security/2018/dsa-4082 | vendor-advisory x_refsource_DEBIAN x_transferred |
| https://usn.ubuntu.com/3617-3/ | vendor-advisory x_refsource_UBUNTU x_transferred |
| https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html | mailing-list x_refsource_MLIST x_transferred |
| https://usn.ubuntu.com/3632-1/ | vendor-advisory x_refsource_UBUNTU x_transferred |
| http://www.securityfocus.com/bid/102227 | vdb-entry x_refsource_BID x_transferred |
| https://usn.ubuntu.com/3620-2/ | vendor-advisory x_refsource_UBUNTU x_transferred |
| https://www.spinics.net/lists/kvm/msg160796.html | x_refsource_MISC x_transferred |
| https://www.debian.org/security/2017/dsa-4073 | vendor-advisory x_refsource_DEBIAN x_transferred |
| https://usn.ubuntu.com/3617-2/ | vendor-advisory x_refsource_UBUNTU x_transferred |
| https://usn.ubuntu.com/3620-1/ | vendor-advisory x_refsource_UBUNTU x_transferred |
| https://usn.ubuntu.com/3619-1/ | vendor-advisory x_refsource_UBUNTU x_transferred |