fkie_cve-2017-8106
Vulnerability from fkie_nvd
Published
2017-04-24 23:59
Modified
2025-04-20 01:37
Severity ?
Summary
The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugzilla.kernel.org/show_bug.cgi?id=195167 | Issue Tracking | |
cve@mitre.org | https://launchpad.net/bugs/1678676 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.kernel.org/show_bug.cgi?id=195167 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.net/bugs/1678676 | Issue Tracking |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "B291154A-4B91-4A0E-AAAE-716A8BB7BF99", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "D835FBA1-49DE-4184-BEC8-7ED2B3F7B0BB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "080BD3C9-0606-4D9A-B7AE-3DF9F75B8FF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "CCDF0F11-3DB4-41F6-B6D3-383857884258", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "2FB1772A-F4AA-4AB8-9FC9-10993A6A5B46", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "4DB5B4D7-C79C-448E-B0D4-A6A9C440F49C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*", "matchCriteriaId": "7C9A32A2-C1EC-4463-B21F-79E6592C5339", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*", "matchCriteriaId": "DD8683B9-63EF-43D0-8E4F-2909429B47E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*", "matchCriteriaId": "91F6A187-E8B1-47CF-B375-FB453F8000F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*", "matchCriteriaId": "97A4332E-E1D4-4B6E-B9FE-B33CCF083402", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "1949D7D6-7DD2-458B-89D3-B0090C8E9984", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*", "matchCriteriaId": "BA23201B-8DC1-4694-8DD9-661BC78F152A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*", "matchCriteriaId": "FDDB83D1-8A25-495E-BC27-0E2059255DEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*", "matchCriteriaId": "5BF8D075-08F5-4CF4-8416-9963CA6B04D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*", "matchCriteriaId": "1E4ED579-E7D9-434A-A357-3D9056784227", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*", "matchCriteriaId": "79E9D537-1F1A-462B-A6D6-2DC4FF07A843", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*", "matchCriteriaId": "1B2AEF20-1F50-497D-AD1E-AC0ED7699DDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*", "matchCriteriaId": "93A7B9D2-EF81-4952-AD6F-C5870331F17E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.18:*:*:*:*:*:*:*", "matchCriteriaId": "1BACD07E-51D7-4081-89E0-276FE3ADCEAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.19:*:*:*:*:*:*:*", "matchCriteriaId": "D46AEA84-FDC3-41A3-9F63-D38290C9862F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.20:*:*:*:*:*:*:*", "matchCriteriaId": "54C401E0-6258-4F25-82CF-B81B7624C509", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.21:*:*:*:*:*:*:*", "matchCriteriaId": "0810E4B6-1510-46A6-9519-127E226BDE01", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.22:*:*:*:*:*:*:*", "matchCriteriaId": "B7BA4A7A-FF32-4763-8278-08C2DEBAA05A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.23:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E44C3-41FC-41A1-9ACF-1DD00DE06CFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.24:*:*:*:*:*:*:*", "matchCriteriaId": "860169C6-3AF9-4F00-869C-DE0DE289DF91", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.25:*:*:*:*:*:*:*", "matchCriteriaId": "51398597-A993-496F-84E4-993B74AC0508", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.26:*:*:*:*:*:*:*", "matchCriteriaId": "B9879AED-F53E-47D7-ACA1-E61EBF3133EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.27:*:*:*:*:*:*:*", "matchCriteriaId": "048698BF-3B0C-449C-9D2A-81B5CAB4A27F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.28:*:*:*:*:*:*:*", "matchCriteriaId": "D4EED7A3-B40C-4C02-80B7-1836A3C4C2A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.29:*:*:*:*:*:*:*", "matchCriteriaId": "4B72AFA7-C594-4BCF-BB79-F3EE675766A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.30:*:*:*:*:*:*:*", "matchCriteriaId": "5195ED19-4482-435C-9224-20B0EDF6F114", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.31:*:*:*:*:*:*:*", "matchCriteriaId": "D6AC043B-EACB-406C-B4D0-7B22CF8B0EEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.32:*:*:*:*:*:*:*", "matchCriteriaId": "FEA5C700-05F9-4077-ACE6-8A7EE033B464", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.33:*:*:*:*:*:*:*", "matchCriteriaId": "BE74D9A2-DCD6-4E14-B061-972EB7CF1EE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.34:*:*:*:*:*:*:*", "matchCriteriaId": "E50006B4-3AB0-4FF2-9111-F0E1191D243C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.35:*:*:*:*:*:*:*", "matchCriteriaId": "B654475F-4C5F-485E-BB77-CFEF6D214C75", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.36:*:*:*:*:*:*:*", "matchCriteriaId": "2A4304FA-0868-4A81-B6E4-FBDF84B153AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.37:*:*:*:*:*:*:*", "matchCriteriaId": "2100C16C-437E-4EEC-BD04-D75CF3D02333", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.38:*:*:*:*:*:*:*", "matchCriteriaId": "4EF474B9-2740-498C-909B-DBFD3FDC23CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.39:*:*:*:*:*:*:*", "matchCriteriaId": "88F0A015-6CF7-4528-9CF9-E0E76CB3E1D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.40:*:*:*:*:*:*:*", "matchCriteriaId": "09723483-B241-4D82-862C-AA0098F680CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.41:*:*:*:*:*:*:*", "matchCriteriaId": "A084853B-91CB-4964-A498-9B4208152138", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.42:*:*:*:*:*:*:*", "matchCriteriaId": "A19BA782-DCFB-48B6-973C-3AD050ED51F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.43:*:*:*:*:*:*:*", "matchCriteriaId": "F87E856E-AD83-4EBF-BD06-4736B9116083", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.44:*:*:*:*:*:*:*", "matchCriteriaId": "04D914E1-7229-4642-BDC9-5A8261E03538", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.45:*:*:*:*:*:*:*", "matchCriteriaId": "BFDC2E5D-EF73-4DED-8E4C-8309BA53A092", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.46:*:*:*:*:*:*:*", "matchCriteriaId": "9406CC5F-6D28-4836-BDD4-A50674F1333D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.47:*:*:*:*:*:*:*", "matchCriteriaId": "124ADC63-CDA6-4A27-A844-4F33DB6A4031", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.48:*:*:*:*:*:*:*", "matchCriteriaId": "40FD9974-27BC-4DE4-9CB0-FC2D0CAA1D46", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.49:*:*:*:*:*:*:*", "matchCriteriaId": "72559629-4BB1-4651-BEF7-B6E74683C401", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.50:*:*:*:*:*:*:*", "matchCriteriaId": "8648EF03-5B27-40BD-90A0-59DC8120440B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.51:*:*:*:*:*:*:*", "matchCriteriaId": "8C26111E-EF43-4CFA-977E-6658A7B62C27", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.52:*:*:*:*:*:*:*", "matchCriteriaId": "06A8E46E-7CAB-49E2-A1DD-F146FBBBA19E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.53:*:*:*:*:*:*:*", "matchCriteriaId": "7799F2BF-9C85-444A-970A-6F245463425F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.54:*:*:*:*:*:*:*", "matchCriteriaId": "91854A06-32BC-4C9F-AA63-BA32F2B385DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.55:*:*:*:*:*:*:*", "matchCriteriaId": "33509600-67E3-4C78-B0C4-4D62D70FCD94", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.56:*:*:*:*:*:*:*", "matchCriteriaId": "10237625-21BB-43A0-A7A2-EE662703391E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.57:*:*:*:*:*:*:*", "matchCriteriaId": "11E6E8FD-CAA5-4A93-ABD5-815B51D7DE9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.58:*:*:*:*:*:*:*", "matchCriteriaId": "3C3B5CB0-C094-471A-A6D5-2FBC91384FDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.59:*:*:*:*:*:*:*", "matchCriteriaId": "B77FCA1E-99B4-4D10-9A59-65FE265C9DBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*", "matchCriteriaId": "50513044-C297-4D5E-BD45-6FD603A29F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.14.67:*:*:*:*:*:*:*", "matchCriteriaId": "E4CB47E3-1DF7-4FB1-A436-F7648C8F0EEC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.14.68:*:*:*:*:*:*:*", "matchCriteriaId": "F48C8632-E8C5-4907-AEDC-1B33D8A5AF04", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*", "matchCriteriaId": "F5827B65-9941-4927-8D47-57229EEA290F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer." }, { "lang": "es", "value": "La funci\u00f3n handle_invept de arch/x86/kvm/vmx.c del Kernel de Linux, versiones 3.12 a 3.15, permite a los usuarios privilegiados del sistema operativo hu\u00e9sped de KVM causar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda del sistema operativo anfitri\u00f3n) a trav\u00e9s de una instrucci\u00f3n single-context INVEPT con puntero EPT nulo." } ], "id": "CVE-2017-8106", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-04-24T23:59:00.753", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://launchpad.net/bugs/1678676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://launchpad.net/bugs/1678676" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…