Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-12188

Опубликовано: 11 окт. 2017
Источник: debian
EPSS Низкий

Описание

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.13.4-2package
linuxfixed4.9.65-1stretchpackage
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1500380

  • https://www.spinics.net/lists/kvm/msg156651.html

EPSS

Процентиль: 17%
0.00055
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 8 лет назад

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."

CVSS3: 7.6
redhat
около 8 лет назад

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."

CVSS3: 7.8
nvd
около 8 лет назад

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."

CVSS3: 7.8
github
больше 3 лет назад

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."

oracle-oval
больше 7 лет назад

ELSA-2018-0395: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 17%
0.00055
Низкий