First published: Tue Oct 10 2017(Updated: )
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.13.5 | |
Linux Linux kernel | >=4.6<4.9.57 | |
Linux Linux kernel | >=4.10<4.13.8 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2017-12188.
CVE-2017-12188 has a severity rating of high.
CVE-2017-12188 allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service.
To fix CVE-2017-12188, update your Linux kernel to version 4.14.x or higher.
You can find more information about CVE-2017-12188 at the following references: [1] [2] [3]