vulnerability

Huawei EulerOS: CVE-2017-12188: kernel security update

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Oct 11, 2017
Added
Nov 30, 2017
Modified
Aug 13, 2025

Description

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an MMU potential stack buffer overrun.

Solutions

huawei-euleros-2_0_sp1-upgrade-kernelhuawei-euleros-2_0_sp1-upgrade-kernel-debughuawei-euleros-2_0_sp1-upgrade-kernel-debuginfohuawei-euleros-2_0_sp1-upgrade-kernel-debuginfo-common-x86_64huawei-euleros-2_0_sp1-upgrade-kernel-develhuawei-euleros-2_0_sp1-upgrade-kernel-headershuawei-euleros-2_0_sp1-upgrade-kernel-toolshuawei-euleros-2_0_sp1-upgrade-kernel-tools-libshuawei-euleros-2_0_sp1-upgrade-perfhuawei-euleros-2_0_sp1-upgrade-python-perf
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.