mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
112 lines
4.0 KiB
JSON
112 lines
4.0 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2017-12154",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Linux kernel through 4.13.3",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "Linux kernel through 4.13.3"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The prepare_vmcs02 function in arch/x86/kvm/vmx.c in the Linux kernel through 4.13.3 does not ensure that the \"CR8-load exiting\" and \"CR8-store exiting\" L0 vmcs02 controls exist in cases where L1 omits the \"use TPR shadow\" vmcs12 control, which allows KVM L2 guest OS users to obtain read and write access to the hardware CR8 register."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "incorrect access control"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=51aa68e7d57e3217192d88ce90fd5b8ef29ec94f"
|
|
},
|
|
{
|
|
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1491224",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1491224"
|
|
},
|
|
{
|
|
"name": "RHSA-2018:1062",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2018:1062"
|
|
},
|
|
{
|
|
"name": "100856",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/100856"
|
|
},
|
|
{
|
|
"name": "DSA-3981",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2017/dsa-3981"
|
|
},
|
|
{
|
|
"name": "https://www.spinics.net/lists/kvm/msg155414.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.spinics.net/lists/kvm/msg155414.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2018:0676",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2018:0676"
|
|
},
|
|
{
|
|
"name": "USN-3698-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3698-1/"
|
|
},
|
|
{
|
|
"name": "https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/torvalds/linux/commit/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f"
|
|
},
|
|
{
|
|
"name": "USN-3698-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3698-2/"
|
|
},
|
|
{
|
|
"refsource": "REDHAT",
|
|
"name": "RHSA-2019:1946",
|
|
"url": "https://access.redhat.com/errata/RHSA-2019:1946"
|
|
}
|
|
]
|
|
}
|
|
} |