arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101267 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:0395 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0412 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1500380 | Issue Tracking Patch Third Party Advisory |
https://patchwork.kernel.org/patch/9996579/ | Issue Tracking Patch Vendor Advisory |
https://patchwork.kernel.org/patch/9996587/ | Issue Tracking Patch Vendor Advisory |
http://www.securityfocus.com/bid/101267 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2018:0395 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:0412 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1500380 | Issue Tracking Patch Third Party Advisory |
https://patchwork.kernel.org/patch/9996579/ | Issue Tracking Patch Vendor Advisory |
https://patchwork.kernel.org/patch/9996587/ | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:09
Type | Values Removed | Values Added |
---|---|---|
Summary | (es) arch/x86/kvm/mmu.c en el kernel de Linux hasta 4.13.5, cuando se utiliza la virtualización anidada, no atraviesa adecuadamente las entradas de la tabla de páginas invitadas para resolver una dirección virtual invitada, lo que permite a los usuarios del sistema operativo invitado L1 ejecutar código arbitrario en el sistema operativo host o provocar una denegación de servicio (índice incorrecto durante el recorrido de la página y falla del sistema operativo host), también conocido como "potencial desbordamiento de búfer en la región stack de la memoria de MMU". | |
References | () http://www.securityfocus.com/bid/101267 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:0395 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0412 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1500380 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://patchwork.kernel.org/patch/9996579/ - Issue Tracking, Patch, Vendor Advisory | |
References | () https://patchwork.kernel.org/patch/9996587/ - Issue Tracking, Patch, Vendor Advisory |
02 Apr 2024, 18:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2018:0395 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0412 - Third Party Advisory |
Information
Published : 2017-10-11 15:29
Updated : 2024-11-21 03:09
NVD link : CVE-2017-12188
Mitre link : CVE-2017-12188
CVE.ORG link : CVE-2017-12188
JSON object : View
Products Affected
linux
- linux_kernel