Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2017-12154): Linux kernel (Trusty HWE) vulnerabilities

Back to Search

Ubuntu: (Multiple Advisories) (CVE-2017-12154): Linux kernel (Trusty HWE) vulnerabilities

Severity
4
CVSS
(AV:L/AC:L/Au:N/C:P/I:P/A:N)
Published
09/20/2017
Created
07/25/2018
Added
10/31/2017
Modified
08/25/2021

Description

The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the "CR8-load exiting" and "CR8-store exiting" L0 vmcs02 controls exist in cases where L1 omits the "use TPR shadow" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register.

Solution(s)

  • ubuntu-upgrade-linux-image-3-13-0-153-generic
  • ubuntu-upgrade-linux-image-3-13-0-153-generic-lpae
  • ubuntu-upgrade-linux-image-3-13-0-153-lowlatency
  • ubuntu-upgrade-linux-image-3-13-0-153-powerpc-e500
  • ubuntu-upgrade-linux-image-3-13-0-153-powerpc-e500mc
  • ubuntu-upgrade-linux-image-3-13-0-153-powerpc-smp
  • ubuntu-upgrade-linux-image-3-13-0-153-powerpc64-emb
  • ubuntu-upgrade-linux-image-3-13-0-153-powerpc64-smp
  • ubuntu-upgrade-linux-image-4-13-0-1006-raspi2
  • ubuntu-upgrade-linux-image-4-13-0-17-generic
  • ubuntu-upgrade-linux-image-4-13-0-17-generic-lpae
  • ubuntu-upgrade-linux-image-4-13-0-17-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-1009-kvm
  • ubuntu-upgrade-linux-image-4-4-0-1033-gke
  • ubuntu-upgrade-linux-image-4-4-0-1039-aws
  • ubuntu-upgrade-linux-image-4-4-0-1076-raspi2
  • ubuntu-upgrade-linux-image-4-4-0-1078-snapdragon
  • ubuntu-upgrade-linux-image-4-4-0-98-generic
  • ubuntu-upgrade-linux-image-4-4-0-98-generic-lpae
  • ubuntu-upgrade-linux-image-4-4-0-98-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-98-powerpc-e500mc
  • ubuntu-upgrade-linux-image-4-4-0-98-powerpc-smp
  • ubuntu-upgrade-linux-image-4-4-0-98-powerpc64-emb
  • ubuntu-upgrade-linux-image-4-4-0-98-powerpc64-smp
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-generic-lpae-lts-trusty
  • ubuntu-upgrade-linux-image-generic-lpae-lts-xenial
  • ubuntu-upgrade-linux-image-generic-lts-trusty
  • ubuntu-upgrade-linux-image-generic-lts-xenial
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc-e500
  • ubuntu-upgrade-linux-image-powerpc-e500mc
  • ubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc-smp
  • ubuntu-upgrade-linux-image-powerpc-smp-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc64-emb
  • ubuntu-upgrade-linux-image-powerpc64-emb-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc64-smp
  • ubuntu-upgrade-linux-image-powerpc64-smp-lts-xenial
  • ubuntu-upgrade-linux-image-raspi2
  • ubuntu-upgrade-linux-image-snapdragon

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;