CVE-2017-12188

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
References
Link Resource
http://www.securityfocus.com/bid/101267 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0395 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0412 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1500380 Issue Tracking Patch Third Party Advisory
https://patchwork.kernel.org/patch/9996579/ Issue Tracking Patch Vendor Advisory
https://patchwork.kernel.org/patch/9996587/ Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

02 Apr 2024, 18:05

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:0395 - () https://access.redhat.com/errata/RHSA-2018:0395 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0412 - () https://access.redhat.com/errata/RHSA-2018:0412 - Third Party Advisory

Information

Published : 2017-10-11 15:29

Updated : 2024-04-02 18:05


NVD link : CVE-2017-12188

Mitre link : CVE-2017-12188

CVE.ORG link : CVE-2017-12188


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-121

Stack-based Buffer Overflow

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')