vulnerability

Oracle Linux: CVE-2017-17741: ELSA-2018-4172: Unbreakable Enterprise kernel security update (IMPORTANT) (Multiple Advisories)

Severity
3
CVSS
(AV:A/AC:L/Au:S/C:P/I:N/A:N)
Published
2017-12-11
Added
2018-05-16
Modified
2025-01-24

Description

The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
Linux kernel compiled with the KVM virtualization (CONFIG_KVM) support is vulnerable to an out-of-bounds read access issue. It could occur when emulating vmcall instructions invoked by a guest. A guest user/process could use this flaw to disclose kernel memory bytes.

Solution

oracle-linux-upgrade-kernel-uek
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.