{"id":"CVE-2017-17741","details":"The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.","modified":"2026-03-15T22:24:06.674425Z","published":"2017-12-18T08:29:00.210Z","related":["MGASA-2018-0062","MGASA-2018-0063","MGASA-2018-0073","MGASA-2018-0074","MGASA-2018-0076","MGASA-2018-0077","MGASA-2018-0127","SUSE-SU-2018:0437-1","SUSE-SU-2018:0525-1","SUSE-SU-2018:0555-1","SUSE-SU-2018:0660-1","SUSE-SU-2018:0841-1","SUSE-SU-2018:1772-1","SUSE-SU-2018:1816-1","SUSE-SU-2019:1287-1"],"references":[{"type":"WEB","url":"https://usn.ubuntu.com/3617-2/"},{"type":"WEB","url":"https://usn.ubuntu.com/3617-3/"},{"type":"WEB","url":"https://usn.ubuntu.com/3619-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/3619-2/"},{"type":"WEB","url":"https://usn.ubuntu.com/3620-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/3620-2/"},{"type":"WEB","url":"http://www.securityfocus.com/bid/102227"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html"},{"type":"WEB","url":"https://usn.ubuntu.com/3617-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/3632-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4082"},{"type":"REPORT","url":"https://www.debian.org/security/2017/dsa-4073"},{"type":"FIX","url":"https://www.spinics.net/lists/kvm/msg160796.html"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-17741.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.14.7"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}