fkie_cve-2017-8106
Vulnerability from fkie_nvd
Published
2017-04-24 23:59
Modified
2025-04-20 01:37
Summary
The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.
Impacted products
Vendor Product Version
linux linux_kernel 3.12
linux linux_kernel 3.12.1
linux linux_kernel 3.12.2
linux linux_kernel 3.12.3
linux linux_kernel 3.12.4
linux linux_kernel 3.12.5
linux linux_kernel 3.12.6
linux linux_kernel 3.12.7
linux linux_kernel 3.12.8
linux linux_kernel 3.12.9
linux linux_kernel 3.12.10
linux linux_kernel 3.12.11
linux linux_kernel 3.12.12
linux linux_kernel 3.12.13
linux linux_kernel 3.12.14
linux linux_kernel 3.12.15
linux linux_kernel 3.12.16
linux linux_kernel 3.12.17
linux linux_kernel 3.12.18
linux linux_kernel 3.12.19
linux linux_kernel 3.12.20
linux linux_kernel 3.12.21
linux linux_kernel 3.12.22
linux linux_kernel 3.12.23
linux linux_kernel 3.12.24
linux linux_kernel 3.12.25
linux linux_kernel 3.12.26
linux linux_kernel 3.12.27
linux linux_kernel 3.12.28
linux linux_kernel 3.12.29
linux linux_kernel 3.12.30
linux linux_kernel 3.12.31
linux linux_kernel 3.12.32
linux linux_kernel 3.12.33
linux linux_kernel 3.12.34
linux linux_kernel 3.12.35
linux linux_kernel 3.12.36
linux linux_kernel 3.12.37
linux linux_kernel 3.12.38
linux linux_kernel 3.12.39
linux linux_kernel 3.12.40
linux linux_kernel 3.12.41
linux linux_kernel 3.12.42
linux linux_kernel 3.12.43
linux linux_kernel 3.12.44
linux linux_kernel 3.12.45
linux linux_kernel 3.12.46
linux linux_kernel 3.12.47
linux linux_kernel 3.12.48
linux linux_kernel 3.12.49
linux linux_kernel 3.12.50
linux linux_kernel 3.12.51
linux linux_kernel 3.12.52
linux linux_kernel 3.12.53
linux linux_kernel 3.12.54
linux linux_kernel 3.12.55
linux linux_kernel 3.12.56
linux linux_kernel 3.12.57
linux linux_kernel 3.12.58
linux linux_kernel 3.12.59
linux linux_kernel 3.13
linux linux_kernel 3.14.67
linux linux_kernel 3.14.68
linux linux_kernel 3.15



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "B291154A-4B91-4A0E-AAAE-716A8BB7BF99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D835FBA1-49DE-4184-BEC8-7ED2B3F7B0BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "080BD3C9-0606-4D9A-B7AE-3DF9F75B8FF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCDF0F11-3DB4-41F6-B6D3-383857884258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB1772A-F4AA-4AB8-9FC9-10993A6A5B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB5B4D7-C79C-448E-B0D4-A6A9C440F49C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C9A32A2-C1EC-4463-B21F-79E6592C5339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8683B9-63EF-43D0-8E4F-2909429B47E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "91F6A187-E8B1-47CF-B375-FB453F8000F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4332E-E1D4-4B6E-B9FE-B33CCF083402",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1949D7D6-7DD2-458B-89D3-B0090C8E9984",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA23201B-8DC1-4694-8DD9-661BC78F152A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDB83D1-8A25-495E-BC27-0E2059255DEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BF8D075-08F5-4CF4-8416-9963CA6B04D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4ED579-E7D9-434A-A357-3D9056784227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "79E9D537-1F1A-462B-A6D6-2DC4FF07A843",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B2AEF20-1F50-497D-AD1E-AC0ED7699DDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "93A7B9D2-EF81-4952-AD6F-C5870331F17E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BACD07E-51D7-4081-89E0-276FE3ADCEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "D46AEA84-FDC3-41A3-9F63-D38290C9862F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "54C401E0-6258-4F25-82CF-B81B7624C509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0810E4B6-1510-46A6-9519-127E226BDE01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7BA4A7A-FF32-4763-8278-08C2DEBAA05A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3E44C3-41FC-41A1-9ACF-1DD00DE06CFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "860169C6-3AF9-4F00-869C-DE0DE289DF91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "51398597-A993-496F-84E4-993B74AC0508",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9879AED-F53E-47D7-ACA1-E61EBF3133EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "048698BF-3B0C-449C-9D2A-81B5CAB4A27F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4EED7A3-B40C-4C02-80B7-1836A3C4C2A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B72AFA7-C594-4BCF-BB79-F3EE675766A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "5195ED19-4482-435C-9224-20B0EDF6F114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6AC043B-EACB-406C-B4D0-7B22CF8B0EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA5C700-05F9-4077-ACE6-8A7EE033B464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE74D9A2-DCD6-4E14-B061-972EB7CF1EE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "E50006B4-3AB0-4FF2-9111-F0E1191D243C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "B654475F-4C5F-485E-BB77-CFEF6D214C75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A4304FA-0868-4A81-B6E4-FBDF84B153AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "2100C16C-437E-4EEC-BD04-D75CF3D02333",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF474B9-2740-498C-909B-DBFD3FDC23CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F0A015-6CF7-4528-9CF9-E0E76CB3E1D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "09723483-B241-4D82-862C-AA0098F680CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "A084853B-91CB-4964-A498-9B4208152138",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A19BA782-DCFB-48B6-973C-3AD050ED51F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "F87E856E-AD83-4EBF-BD06-4736B9116083",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "04D914E1-7229-4642-BDC9-5A8261E03538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFDC2E5D-EF73-4DED-8E4C-8309BA53A092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "9406CC5F-6D28-4836-BDD4-A50674F1333D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "124ADC63-CDA6-4A27-A844-4F33DB6A4031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "40FD9974-27BC-4DE4-9CB0-FC2D0CAA1D46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "72559629-4BB1-4651-BEF7-B6E74683C401",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "8648EF03-5B27-40BD-90A0-59DC8120440B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C26111E-EF43-4CFA-977E-6658A7B62C27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "06A8E46E-7CAB-49E2-A1DD-F146FBBBA19E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "7799F2BF-9C85-444A-970A-6F245463425F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "91854A06-32BC-4C9F-AA63-BA32F2B385DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "33509600-67E3-4C78-B0C4-4D62D70FCD94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "10237625-21BB-43A0-A7A2-EE662703391E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E6E8FD-CAA5-4A93-ABD5-815B51D7DE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C3B5CB0-C094-471A-A6D5-2FBC91384FDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.12.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77FCA1E-99B4-4D10-9A59-65FE265C9DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "50513044-C297-4D5E-BD45-6FD603A29F25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.14.67:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4CB47E3-1DF7-4FB1-A436-F7648C8F0EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.14.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "F48C8632-E8C5-4907-AEDC-1B33D8A5AF04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5827B65-9941-4927-8D47-57229EEA290F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n handle_invept de arch/x86/kvm/vmx.c del Kernel de Linux, versiones 3.12 a 3.15, permite a los usuarios privilegiados del sistema operativo hu\u00e9sped de KVM causar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda del sistema operativo anfitri\u00f3n) a trav\u00e9s de una instrucci\u00f3n single-context INVEPT con puntero EPT nulo."
    }
  ],
  "id": "CVE-2017-8106",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 4.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-04-24T23:59:00.753",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://launchpad.net/bugs/1678676"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://launchpad.net/bugs/1678676"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…