CVE-2017-12188

high

Description

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."

References

https://patchwork.kernel.org/patch/9996587/

https://patchwork.kernel.org/patch/9996579/

https://bugzilla.redhat.com/show_bug.cgi?id=1500380

https://access.redhat.com/errata/RHSA-2018:0412

https://access.redhat.com/errata/RHSA-2018:0395

http://www.securityfocus.com/bid/101267

Details

Source: Mitre, NVD

Published: 2017-10-11

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Severity: High