ΠΠΏΠΈΡΠ°Π½ΠΈΠ΅
A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | not-affected | 4.13.0-16.19 |
devel | not-affected | 4.15.0-20.21 |
esm-infra-legacy/trusty | not-affected | 3.11.0-12.19 |
esm-infra/bionic | not-affected | 4.13.0-16.19 |
esm-infra/xenial | not-affected | 4.2.0-16.19 |
precise/esm | not-affected | 3.0.0-12.20 |
trusty | not-affected | 3.11.0-12.19 |
trusty/esm | not-affected | 3.11.0-12.19 |
upstream | not-affected | debian: Fixed before src:linux-2.6 -> src:linux rename |
xenial | not-affected | 4.2.0-16.19 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | not-affected | 4.15.0-1001.1 |
devel | not-affected | 4.15.0-1007.7 |
esm-infra-legacy/trusty | not-affected | 4.4.0-1002.2 |
esm-infra/bionic | not-affected | 4.15.0-1001.1 |
esm-infra/xenial | not-affected | 4.4.0-1001.10 |
precise/esm | DNE | |
trusty | not-affected | 4.4.0-1002.2 |
trusty/esm | not-affected | 4.4.0-1002.2 |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.4.0-1001.10 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | not-affected | 4.15.0-1002.2 |
devel | not-affected | 4.15.0-1009.9 |
esm-infra-legacy/trusty | not-affected | 4.15.0-1023.24~14.04.1 |
esm-infra/bionic | not-affected | 4.15.0-1002.2 |
esm-infra/xenial | not-affected | 4.11.0-1009.9 |
precise/esm | DNE | |
trusty | not-affected | 4.15.0-1023.24~14.04.1 |
trusty/esm | not-affected | 4.15.0-1023.24~14.04.1 |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.11.0-1009.9 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | ignored | end of standard support, was pending |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | pending | 4.18.0-1003.3~18.04.1 |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.15.0-1002.2 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-apps/xenial | DNE | |
esm-infra-legacy/trusty | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.4.0-9019.20 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-apps/xenial | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [abandoned]] |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [abandoned] |
upstream | released | 2.6.36~rc1 |
xenial | ignored | end of standard support |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | not-affected | 4.15.0-1001.1 |
devel | not-affected | 4.15.0-1006.6 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 4.15.0-1001.1 |
esm-infra/xenial | not-affected | 4.10.0-1004.4 |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.10.0-1004.4 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | ignored | end of standard support |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-apps/xenial | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [abandoned]] |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [abandoned] |
upstream | released | 2.6.36~rc1 |
xenial | ignored | end of standard support |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [abandoned]] |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [abandoned] |
upstream | released | 2.6.36~rc1 |
xenial | DNE |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | not-affected | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | |
esm-infra/xenial | not-affected | 4.8.0-36.36~16.04.1 |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.8.0-36.36~16.04.1 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | released | 4.18.0-8.9~18.04.1 |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 4.18.0-8.9~18.04.1 |
esm-infra/xenial | not-affected | 4.8.0-36.36~16.04.1 |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.8.0-36.36~16.04.1 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | not-affected | 4.15.0-1002.2 |
devel | not-affected | 4.15.0-1008.8 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 4.15.0-1002.2 |
esm-infra/xenial | not-affected | 4.4.0-1004.9 |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.4.0-1004.9 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise/esm | not-affected | 3.13.0-24.46~precise1 |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | DNE |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [end of standard support]] |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [end of standard support] |
upstream | released | 2.6.36~rc1 |
xenial | DNE |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [end of standard support]] |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [end of standard support] |
upstream | released | 2.6.36~rc1 |
xenial | DNE |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [end of standard support]] |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [end of standard support] |
upstream | released | 2.6.36~rc1 |
xenial | DNE |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | not-affected | 4.4.0-13.29~14.04.1 |
precise/esm | DNE | |
trusty | not-affected | 4.4.0-13.29~14.04.1 |
trusty/esm | not-affected | 4.4.0-13.29~14.04.1 |
upstream | released | 2.6.36~rc1 |
xenial | DNE |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [abandoned]] |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [abandoned] |
upstream | released | 2.6.36~rc1 |
xenial | DNE |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-apps/xenial | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [abandoned]] |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [abandoned] |
upstream | released | 2.6.36~rc1 |
xenial | ignored | end of standard support |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was ignored [abandoned]] |
precise/esm | DNE | |
trusty | ignored | end of standard support |
trusty/esm | DNE | trusty was ignored [abandoned] |
upstream | released | 2.6.36~rc1 |
xenial | DNE |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | not-affected | 4.15.0-1002.3 |
devel | not-affected | 4.15.0-1004.5 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 4.15.0-1002.3 |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.13.0-1008.9 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | not-affected | 4.13.0-1005.5 |
devel | not-affected | 4.15.0-1010.11 |
esm-infra-legacy/trusty | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.2.0-1013.19 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π Π΅Π»ΠΈΠ· | Π‘ΡΠ°ΡΡΡ | ΠΡΠΈΠΌΠ΅ΡΠ°Π½ΠΈΠ΅ |
---|---|---|
bionic | not-affected | |
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | released | 2.6.36~rc1 |
xenial | not-affected | 4.4.0-1012.12 |
ΠΠΎΠΊΠ°Π·ΡΠ²Π°ΡΡ ΠΏΠΎ
Π‘ΡΡΠ»ΠΊΠΈ Π½Π° ΠΈΡΡΠΎΡΠ½ΠΈΠΊΠΈ
7.2 High
CVSS2
7.8 High
CVSS3
Π‘Π²ΡΠ·Π°Π½Π½ΡΠ΅ ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ
A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.
A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.
A flaw was found in Linux kernel's KVM virtualization subsystem. The V ...
A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.
Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΡ ΠΏΠΎΠ΄ΡΠΈΡΡΠ΅ΠΌΡ Π²ΠΈΡΡΡΠ°Π»ΠΈΠ·Π°ΡΠΈΠΈ Kernel-based Virtual Machine ΡΠ΄ΡΠ° ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠ°Ρ Π½Π°ΡΡΡΠΈΡΠ΅Π»Ρ ΠΏΠΎΠ²ΡΡΠΈΡΡ ΡΠ²ΠΎΠΈ ΠΏΡΠΈΠ²ΠΈΠ»Π΅Π³ΠΈΠΈ
7.2 High
CVSS2
7.8 High
CVSS3