First published: Tue Nov 21 2017(Updated: )
It was discovered that the KVM subsystem in the Linux kernel did not properly keep track of nested levels in guest page tables. A local attacker in a guest VM could use this to cause a denial of service (host OS crash) or possibly execute arbitrary code in the host OS.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-4.11.0-1015-azure | <4.11.0-1015.15 | 4.11.0-1015.15 |
Ubuntu gir1.2-packagekitglib-1.0 | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability is a flaw in the KVM subsystem in the Linux kernel that allows a local attacker in a guest VM to cause a denial of service or execute arbitrary code in the host OS.
The vulnerability can result in a crash of the host OS or allow an attacker to execute arbitrary code.
The vulnerability affects Ubuntu 16.04 with Linux kernel version 4.11.0-1015-azure.
To fix the vulnerability, update the linux-image-4.11.0-1015-azure package to version 4.11.0-1015.15 or later.
More information about USN-3488-1 can be found on the Ubuntu Security Notices website.