It was discovered that the KVM subsystem in the Linux kernel did not properly keep track of nested levels in guest page tables. A local attacker in a guest VM could use this to cause a denial of service (host OS crash) or possibly execute arbitrary code in the host OS.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.11.0-1015.15", "binary_name": "linux-azure-cloud-tools-4.11.0-1015" }, { "binary_version": "4.11.0-1015.15", "binary_name": "linux-azure-cloud-tools-4.11.0-1015-dbgsym" }, { "binary_version": "4.11.0-1015.15", "binary_name": "linux-azure-headers-4.11.0-1015" }, { "binary_version": "4.11.0-1015.15", "binary_name": "linux-azure-tools-4.11.0-1015" }, { "binary_version": "4.11.0-1015.15", "binary_name": "linux-azure-tools-4.11.0-1015-dbgsym" }, { "binary_version": "4.11.0-1015.15", "binary_name": "linux-cloud-tools-4.11.0-1015-azure" }, { "binary_version": "4.11.0-1015.15", "binary_name": "linux-headers-4.11.0-1015-azure" }, { "binary_version": "4.11.0-1015.15", "binary_name": "linux-image-4.11.0-1015-azure" }, { "binary_version": "4.11.0-1015.15", "binary_name": "linux-image-4.11.0-1015-azure-dbgsym" }, { "binary_version": "4.11.0-1015.15", "binary_name": "linux-image-extra-4.11.0-1015-azure" }, { "binary_version": "4.11.0-1015.15", "binary_name": "linux-tools-4.11.0-1015-azure" } ] }