High severity7.8NVD Advisory· Published Oct 11, 2017· Updated May 13, 2026
CVE-2017-12188
CVE-2017-12188
Description
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- patchwork.kernel.org/patch/9996579/nvdIssue TrackingPatchVendor Advisory
- patchwork.kernel.org/patch/9996587/nvdIssue TrackingPatchVendor Advisory
- www.securityfocus.com/bid/101267nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2018:0395nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2018:0412nvdThird Party Advisory
News mentions
0No linked articles in our index yet.