CVE-2017-12188

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
References
Link Resource
http://www.securityfocus.com/bid/101267 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0395 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0412 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1500380 Issue Tracking Patch Third Party Advisory
https://patchwork.kernel.org/patch/9996579/ Issue Tracking Patch Vendor Advisory
https://patchwork.kernel.org/patch/9996587/ Issue Tracking Patch Vendor Advisory
http://www.securityfocus.com/bid/101267 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2018:0395 Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0412 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1500380 Issue Tracking Patch Third Party Advisory
https://patchwork.kernel.org/patch/9996579/ Issue Tracking Patch Vendor Advisory
https://patchwork.kernel.org/patch/9996587/ Issue Tracking Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:09

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/101267 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101267 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2018:0395 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0395 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2018:0412 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2018:0412 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1500380 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1500380 - Issue Tracking, Patch, Third Party Advisory
References () https://patchwork.kernel.org/patch/9996579/ - Issue Tracking, Patch, Vendor Advisory () https://patchwork.kernel.org/patch/9996579/ - Issue Tracking, Patch, Vendor Advisory
References () https://patchwork.kernel.org/patch/9996587/ - Issue Tracking, Patch, Vendor Advisory () https://patchwork.kernel.org/patch/9996587/ - Issue Tracking, Patch, Vendor Advisory

02 Apr 2024, 18:05

Type Values Removed Values Added
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:0412 - (REDHAT) https://access.redhat.com/errata/RHSA-2018:0412 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2018:0395 - (REDHAT) https://access.redhat.com/errata/RHSA-2018:0395 - Third Party Advisory

Information

Published : 2017-10-11 15:29

Updated : 2025-04-20 01:37


NVD link : CVE-2017-12188

Mitre link : CVE-2017-12188

CVE.ORG link : CVE-2017-12188


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-121

Stack-based Buffer Overflow

CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')