fkie_cve-2017-8106
Vulnerability from fkie_nvd
Published
2017-04-24 23:59
Modified
2025-04-20 01:37
Severity ?
Summary
The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://bugzilla.kernel.org/show_bug.cgi?id=195167 | Issue Tracking | |
| cve@mitre.org | https://launchpad.net/bugs/1678676 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.kernel.org/show_bug.cgi?id=195167 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.net/bugs/1678676 | Issue Tracking |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B291154A-4B91-4A0E-AAAE-716A8BB7BF99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835FBA1-49DE-4184-BEC8-7ED2B3F7B0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "080BD3C9-0606-4D9A-B7AE-3DF9F75B8FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDF0F11-3DB4-41F6-B6D3-383857884258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "2FB1772A-F4AA-4AB8-9FC9-10993A6A5B46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB5B4D7-C79C-448E-B0D4-A6A9C440F49C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7C9A32A2-C1EC-4463-B21F-79E6592C5339",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DD8683B9-63EF-43D0-8E4F-2909429B47E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.8:*:*:*:*:*:*:*",
"matchCriteriaId": "91F6A187-E8B1-47CF-B375-FB453F8000F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.9:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4332E-E1D4-4B6E-B9FE-B33CCF083402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1949D7D6-7DD2-458B-89D3-B0090C8E9984",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BA23201B-8DC1-4694-8DD9-661BC78F152A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDB83D1-8A25-495E-BC27-0E2059255DEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF8D075-08F5-4CF4-8416-9963CA6B04D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4ED579-E7D9-434A-A357-3D9056784227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.15:*:*:*:*:*:*:*",
"matchCriteriaId": "79E9D537-1F1A-462B-A6D6-2DC4FF07A843",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.16:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2AEF20-1F50-497D-AD1E-AC0ED7699DDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.17:*:*:*:*:*:*:*",
"matchCriteriaId": "93A7B9D2-EF81-4952-AD6F-C5870331F17E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1BACD07E-51D7-4081-89E0-276FE3ADCEAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.19:*:*:*:*:*:*:*",
"matchCriteriaId": "D46AEA84-FDC3-41A3-9F63-D38290C9862F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.20:*:*:*:*:*:*:*",
"matchCriteriaId": "54C401E0-6258-4F25-82CF-B81B7624C509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.21:*:*:*:*:*:*:*",
"matchCriteriaId": "0810E4B6-1510-46A6-9519-127E226BDE01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.22:*:*:*:*:*:*:*",
"matchCriteriaId": "B7BA4A7A-FF32-4763-8278-08C2DEBAA05A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.23:*:*:*:*:*:*:*",
"matchCriteriaId": "5B3E44C3-41FC-41A1-9ACF-1DD00DE06CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.24:*:*:*:*:*:*:*",
"matchCriteriaId": "860169C6-3AF9-4F00-869C-DE0DE289DF91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.25:*:*:*:*:*:*:*",
"matchCriteriaId": "51398597-A993-496F-84E4-993B74AC0508",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.26:*:*:*:*:*:*:*",
"matchCriteriaId": "B9879AED-F53E-47D7-ACA1-E61EBF3133EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.27:*:*:*:*:*:*:*",
"matchCriteriaId": "048698BF-3B0C-449C-9D2A-81B5CAB4A27F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.28:*:*:*:*:*:*:*",
"matchCriteriaId": "D4EED7A3-B40C-4C02-80B7-1836A3C4C2A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.29:*:*:*:*:*:*:*",
"matchCriteriaId": "4B72AFA7-C594-4BCF-BB79-F3EE675766A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.30:*:*:*:*:*:*:*",
"matchCriteriaId": "5195ED19-4482-435C-9224-20B0EDF6F114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.31:*:*:*:*:*:*:*",
"matchCriteriaId": "D6AC043B-EACB-406C-B4D0-7B22CF8B0EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.32:*:*:*:*:*:*:*",
"matchCriteriaId": "FEA5C700-05F9-4077-ACE6-8A7EE033B464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.33:*:*:*:*:*:*:*",
"matchCriteriaId": "BE74D9A2-DCD6-4E14-B061-972EB7CF1EE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.34:*:*:*:*:*:*:*",
"matchCriteriaId": "E50006B4-3AB0-4FF2-9111-F0E1191D243C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.35:*:*:*:*:*:*:*",
"matchCriteriaId": "B654475F-4C5F-485E-BB77-CFEF6D214C75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.36:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4304FA-0868-4A81-B6E4-FBDF84B153AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.37:*:*:*:*:*:*:*",
"matchCriteriaId": "2100C16C-437E-4EEC-BD04-D75CF3D02333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.38:*:*:*:*:*:*:*",
"matchCriteriaId": "4EF474B9-2740-498C-909B-DBFD3FDC23CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.39:*:*:*:*:*:*:*",
"matchCriteriaId": "88F0A015-6CF7-4528-9CF9-E0E76CB3E1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.40:*:*:*:*:*:*:*",
"matchCriteriaId": "09723483-B241-4D82-862C-AA0098F680CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.41:*:*:*:*:*:*:*",
"matchCriteriaId": "A084853B-91CB-4964-A498-9B4208152138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.42:*:*:*:*:*:*:*",
"matchCriteriaId": "A19BA782-DCFB-48B6-973C-3AD050ED51F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.43:*:*:*:*:*:*:*",
"matchCriteriaId": "F87E856E-AD83-4EBF-BD06-4736B9116083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.44:*:*:*:*:*:*:*",
"matchCriteriaId": "04D914E1-7229-4642-BDC9-5A8261E03538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.45:*:*:*:*:*:*:*",
"matchCriteriaId": "BFDC2E5D-EF73-4DED-8E4C-8309BA53A092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.46:*:*:*:*:*:*:*",
"matchCriteriaId": "9406CC5F-6D28-4836-BDD4-A50674F1333D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.47:*:*:*:*:*:*:*",
"matchCriteriaId": "124ADC63-CDA6-4A27-A844-4F33DB6A4031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.48:*:*:*:*:*:*:*",
"matchCriteriaId": "40FD9974-27BC-4DE4-9CB0-FC2D0CAA1D46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.49:*:*:*:*:*:*:*",
"matchCriteriaId": "72559629-4BB1-4651-BEF7-B6E74683C401",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.50:*:*:*:*:*:*:*",
"matchCriteriaId": "8648EF03-5B27-40BD-90A0-59DC8120440B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.51:*:*:*:*:*:*:*",
"matchCriteriaId": "8C26111E-EF43-4CFA-977E-6658A7B62C27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.52:*:*:*:*:*:*:*",
"matchCriteriaId": "06A8E46E-7CAB-49E2-A1DD-F146FBBBA19E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.53:*:*:*:*:*:*:*",
"matchCriteriaId": "7799F2BF-9C85-444A-970A-6F245463425F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.54:*:*:*:*:*:*:*",
"matchCriteriaId": "91854A06-32BC-4C9F-AA63-BA32F2B385DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.55:*:*:*:*:*:*:*",
"matchCriteriaId": "33509600-67E3-4C78-B0C4-4D62D70FCD94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.56:*:*:*:*:*:*:*",
"matchCriteriaId": "10237625-21BB-43A0-A7A2-EE662703391E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.57:*:*:*:*:*:*:*",
"matchCriteriaId": "11E6E8FD-CAA5-4A93-ABD5-815B51D7DE9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.58:*:*:*:*:*:*:*",
"matchCriteriaId": "3C3B5CB0-C094-471A-A6D5-2FBC91384FDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.12.59:*:*:*:*:*:*:*",
"matchCriteriaId": "B77FCA1E-99B4-4D10-9A59-65FE265C9DBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "50513044-C297-4D5E-BD45-6FD603A29F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14.67:*:*:*:*:*:*:*",
"matchCriteriaId": "E4CB47E3-1DF7-4FB1-A436-F7648C8F0EEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.14.68:*:*:*:*:*:*:*",
"matchCriteriaId": "F48C8632-E8C5-4907-AEDC-1B33D8A5AF04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "F5827B65-9941-4927-8D47-57229EEA290F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer."
},
{
"lang": "es",
"value": "La funci\u00f3n handle_invept de arch/x86/kvm/vmx.c del Kernel de Linux, versiones 3.12 a 3.15, permite a los usuarios privilegiados del sistema operativo hu\u00e9sped de KVM causar una denegaci\u00f3n de servicio (referencia a puntero nulo y ca\u00edda del sistema operativo anfitri\u00f3n) a trav\u00e9s de una instrucci\u00f3n single-context INVEPT con puntero EPT nulo."
}
],
"id": "CVE-2017-8106",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-04-24T23:59:00.753",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://launchpad.net/bugs/1678676"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://bugzilla.kernel.org/show_bug.cgi?id=195167"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://launchpad.net/bugs/1678676"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…