The KVM implementation in the Linux kernel through 4.14.7 allows attackers to obtain potentially sensitive information from kernel memory, aka a write_mmio stack-based out-of-bounds read, related to arch/x86/kvm/x86.c and include/trace/events/kvm.h.
3.13.0-144.1934.4.0-1016.164.4.0-119.143~14.04.14.4.0-119.1434.4.0-1054.634.13.0-1014.174.13.0-1012.164.13.0-41.46~16.04.14.4.0-1020.254.13.0-1022.24Exploitability
AV:LAC:LPR:LUI:NScope
S:CImpact
C:HI:NA:NCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N