CVE-2017-12188 PUBLISHED

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."

EPSS 0.05% · 17.1th percentile

Risk Scores

EPSS Score
0.05%
17.1th percentile

Affected Products

VendorProductVersions
Ubuntu:22.04:LTSlinux-riscv5.15.0-1011.12, 0, 5.13.0-1004.4
Ubuntu:18.04:LTSlinux-hwe-edge5.0.0-15.16~18.04.1, 5.3.0-24.26~18.04.2, 5.3.0-23.25~18.04.2
Ubuntu:22.04:LTSlinux-intel-iot-realtime5.15.0-1073.75, 0
Ubuntu:20.04:LTSlinux-riscv5.4.0-34.38, 5.4.0-36.41, 5.4.0-30.34
Ubuntu:16.04:LTSlinux-azure4.11.0-1009.9, 0, 4.11.0-1014.14
Ubuntu:20.04:LTSlinux-azure-fde0, 5.4.0-1103.109+cvm1.1, 5.4.0-1100.106+cvm1.1
Ubuntu:18.04:LTSlinux-azure5.0.0-1025.27~18.04.1, 5.0.0-1022.23~18.04.1, 5.0.0-1020.21~18.04.1
Ubuntu:22.04:LTSlinux-realtime5.15.0-1032.35, 0
Ubuntu:18.04:LTSlinux-hwe5.3.0-64.58~18.04.1, 0, 4.18.0-13.14~18.04.1
Ubuntu:18.04:LTSlinux-gcp4.15.0-1001.1, 5.0.0-1034.35, 5.0.0-1033.34
Ubuntu:16.04:LTSlinux-gcp4.10.0-1008.8, 4.10.0-1007.7, 4.10.0-1006.6
Ubuntu:20.04:LTSlinux-raspi25.4.0-1006.6, 5.4.0-1004.4, 5.3.0-1017.19
Ubuntu:24.04:LTSlinux-raspi-realtime6.8.0-2019.20, 0
Ubuntu:20.04:LTSlinux-gke5.4.0-1066.69, 5.4.0-1067.70, 5.4.0-1068.71
Ubuntu:18.04:LTSlinux-oem4.15.0-1008.11, 4.15.0-1101.112, 4.15.0-1100.110
Ubuntu:16.04:LTSlinux-hwe4.13.0-26.29~16.04.2, 4.10.0-42.46~16.04.1, 4.10.0-40.44~16.04.1

Timeline

References

Open in Interactive Console →