CVE-2017-12188
Kernel: KVM: MMU potential stack buffer overrun during page walks
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
arch/x86/kvm/mmu.c en el kernel de Linux hasta 4.13.5, cuando se utiliza la virtualización anidada, no atraviesa adecuadamente las entradas de la tabla de páginas invitadas para resolver una dirección virtual invitada, lo que permite a los usuarios del sistema operativo invitado L1 ejecutar código arbitrario en el sistema operativo host o provocar una denegación de servicio (índice incorrecto durante el recorrido de la página y falla del sistema operativo host), también conocido como "potencial desbordamiento de búfer en la región stack de la memoria de MMU".
The Linux kernel built with the KVM visualization support (CONFIG_KVM), with nested visualization(nVMX) feature enabled (nested=1), was vulnerable to a stack buffer overflow issue. The vulnerability could occur while traversing guest page table entries to resolve guest virtual address(gva). An L1 guest could use this flaw to crash the host kernel resulting in denial of service (DoS) or potentially execute arbitrary code on the host to gain privileges on the system.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-08-01 CVE Reserved
- 2017-10-11 CVE Published
- 2024-08-05 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CWE-121: Stack-based Buffer Overflow
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/101267 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1500380 | 2018-03-06 | |
https://patchwork.kernel.org/patch/9996579 | 2024-04-02 | |
https://patchwork.kernel.org/patch/9996587 | 2024-04-02 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2018:0395 | 2024-04-02 | |
https://access.redhat.com/errata/RHSA-2018:0412 | 2024-04-02 | |
https://access.redhat.com/security/cve/CVE-2017-12188 | 2018-03-06 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.6 < 4.9.57 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.6 < 4.9.57" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 4.10 < 4.13.8 Search vendor "Linux" for product "Linux Kernel" and version " >= 4.10 < 4.13.8" | - |
Affected
|