Oval Definition:oval:com.ubuntu.bionic:def:2018129040000000
Revision Date:2018-06-27Version:1
Title:CVE-2018-12904 on Ubuntu 18.04 LTS (bionic) - low.
Description:In arch/x86/kvm/vmx.c in the Linux kernel before 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL. Felix Wilhelm discovered that the KVM implementation in the Linux kernel did not properly perform permission checks in some situations when nested virtualization is used. An attacker in a guest VM could possibly use this to escape into an outer VM or the host OS.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2018-12904
Platform(s):Ubuntu 18.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 18.04 LTS (bionic) is installed.
  • AND Package Information
  • linux package in bionic was vulnerable but has been fixed (note: '4.15.0-33.36').
  • OR linux-aws package in bionic was vulnerable but has been fixed (note: '4.15.0-1020.20').
  • OR linux-azure package in bionic was vulnerable but has been fixed (note: '4.15.0-1022.23').
  • OR linux-gcp package in bionic was vulnerable but has been fixed (note: '4.15.0-1018.19').
  • OR linux-kvm package in bionic was vulnerable but has been fixed (note: '4.15.0-1020.20').
  • OR linux-meta package in bionic was vulnerable but has been fixed (note: '4.15.0-33.36').
  • OR linux-meta-aws package in bionic was vulnerable but has been fixed (note: '4.15.0-1020.20').
  • OR linux-meta-azure package in bionic was vulnerable but has been fixed (note: '4.15.0-1022.23').
  • OR linux-meta-gcp package in bionic was vulnerable but has been fixed (note: '4.15.0-1018.19').
  • OR linux-meta-kvm package in bionic was vulnerable but has been fixed (note: '4.15.0-1020.20').
  • OR linux-meta-oem package in bionic was vulnerable but has been fixed (note: '4.15.0-1017.20').
  • OR linux-meta-raspi2 package in bionic was vulnerable but has been fixed (note: '4.15.0-1021.23').
  • OR linux-oem package in bionic was vulnerable but has been fixed (note: '4.15.0-1017.20').
  • OR linux-raspi2 package in bionic was vulnerable but has been fixed (note: '4.15.0-1021.23').
  • OR linux-signed package in bionic was vulnerable but has been fixed (note: '4.15.0-33.36').
  • OR linux-signed-azure package in bionic was vulnerable but has been fixed (note: '4.15.0-1022.23').
  • OR linux-signed-gcp package in bionic was vulnerable but has been fixed (note: '4.15.0-1018.19').
  • OR linux-signed-oem package in bionic was vulnerable but has been fixed (note: '4.15.0-1017.20').
  • BACK