Description
The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1232-1 | linux security update |
Debian DSA |
DSA-4073-1 | linux security update |
Debian DSA |
DSA-4082-1 | linux security update |
EUVD |
EUVD-2017-8893 | The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h. |
Ubuntu USN |
USN-3617-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3617-2 | Linux (HWE) vulnerabilities |
Ubuntu USN |
USN-3617-3 | Linux kernel (Raspberry Pi 2) vulnerabilities |
Ubuntu USN |
USN-3619-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3619-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3620-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3620-2 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3632-1 | Linux kernel (Azure) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:59:17.618Z
Reserved: 2017-12-18T00:00:00.000Z
Link: CVE-2017-17741
No data.
Status : Modified
Published: 2017-12-18T08:29:00.210
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-17741
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN