Oval Definition:oval:com.ubuntu.xenial:def:2017121880000000
Revision Date:2017-10-11Version:1
Title:CVE-2017-12188 on Ubuntu 16.04 LTS (xenial) - high.
Description:arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun." It was discovered that the KVM subsystem in the Linux kernel did not properly keep track of nested levels in guest page tables. A local attacker in a guest VM could use this to cause a denial of service (host OS crash) or possibly execute arbitrary code in the host OS.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2017-12188
Platform(s):Ubuntu 16.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 16.04 LTS (xenial) is installed.
  • AND Package Information
  • linux-azure package in xenial was vulnerable but has been fixed (note: '4.11.0-1015.15').
  • OR linux-flo: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'abandoned').
  • OR linux-gcp package in xenial was vulnerable but has been fixed (note: '4.10.0-1009.9').
  • OR linux-hwe package in xenial was vulnerable but has been fixed (note: '4.10.0-40.44~16.04.1').
  • OR linux-mako: while related to the CVE in some way, a decision has been made to ignore this issue (note: 'abandoned').
  • OR linux-meta-azure package in xenial was vulnerable but has been fixed (note: '4.11.0-1015.15').
  • OR linux-meta-gcp package in xenial was vulnerable but has been fixed (note: '4.10.0-1009.9').
  • OR linux-meta-hwe package in xenial was vulnerable but has been fixed (note: '4.10.0-40.44~16.04.1').
  • OR linux-oem package in xenial, is related to the CVE in some way and has been fixed (note: '4.13.0-1008.9').
  • OR linux-signed-azure package in xenial was vulnerable but has been fixed (note: '4.11.0-1015.15').
  • OR linux-signed-gcp package in xenial was vulnerable but has been fixed (note: '4.10.0-1009.9').
  • OR linux-signed-hwe package in xenial was vulnerable but has been fixed (note: '4.10.0-40.44~16.04.1').
  • BACK