CVE-2017-12188

NameCVE-2017-12188
Descriptionarch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)wheezy3.2.78-1vulnerable
wheezy (security)3.2.93-1vulnerable
jessie3.16.43-2+deb8u2vulnerable
jessie (security)3.16.43-2+deb8u5vulnerable
stretch4.9.51-1vulnerable
stretch (security)4.9.30-2+deb9u5vulnerable
buster, sid4.13.4-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsource(unstable)4.13.4-2

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=1500380
https://www.spinics.net/lists/kvm/msg156651.html

Search for package or bug name: Reporting problems