CVE-2017-12188

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
References
Link Resource
http://www.securityfocus.com/bid/101267 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0395 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0412 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1500380 Issue Tracking Patch Third Party Advisory
https://patchwork.kernel.org/patch/9996579/ Issue Tracking Patch Vendor Advisory
https://patchwork.kernel.org/patch/9996587/ Issue Tracking Patch Vendor Advisory
http://www.securityfocus.com/bid/101267 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0395 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0412 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1500380 Issue Tracking Patch Third Party Advisory
https://patchwork.kernel.org/patch/9996579/ Issue Tracking Patch Vendor Advisory
https://patchwork.kernel.org/patch/9996587/ Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:09

Type Values Removed Values Added
Summary (es) arch/x86/kvm/mmu.c en el kernel de Linux hasta la versión 4.13.5, cuando se utiliza la virtualización anidada, no desvía las entradas de la tabla de página invitada para resolver una dirección virtual invitada. Esto permite que los usuarios del sistema operativo invitado de la capa 1 ejecuten código arbitrario en el sistema operativo del host o provoquen una denegación de servicio (indexación incorrecta durante el avance de página y cierre inesperado del sistema operativo del host). Esto también se conoce como "MMU potential stack buffer overrun". (es) arch/x86/kvm/mmu.c en el kernel de Linux hasta 4.13.5, cuando se utiliza la virtualización anidada, no atraviesa adecuadamente las entradas de la tabla de páginas invitadas para resolver una dirección virtual invitada, lo que permite a los usuarios del sistema operativo invitado L1 ejecutar código arbitrario en el sistema operativo host o provocar una denegación de servicio (índice incorrecto durante el recorrido de la página y falla del sistema operativo host), también conocido como "potencial desbordamiento de búfer en la región stack de la memoria de MMU".
References () http://www.securityfocus.com/bid/101267 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101267 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:0395 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0395 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0412 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0412 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1500380 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1500380 - Issue Tracking, Patch, Third Party Advisory
References () https://patchwork.kernel.org/patch/9996579/ - Issue Tracking, Patch, Vendor Advisory () https://patchwork.kernel.org/patch/9996579/ - Issue Tracking, Patch, Vendor Advisory
References () https://patchwork.kernel.org/patch/9996587/ - Issue Tracking, Patch, Vendor Advisory () https://patchwork.kernel.org/patch/9996587/ - Issue Tracking, Patch, Vendor Advisory

02 Apr 2024, 18:05

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2018:0395 - () https://access.redhat.com/errata/RHSA-2018:0395 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0412 - () https://access.redhat.com/errata/RHSA-2018:0412 - Third Party Advisory

Information

Published : 2017-10-11 15:29

Updated : 2024-11-21 03:09


NVD link : CVE-2017-12188

Mitre link : CVE-2017-12188

CVE.ORG link : CVE-2017-12188


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-121

Stack-based Buffer Overflow

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')