vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-12188): Linux kernel vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | Oct 11, 2017 | Nov 21, 2017 | Mar 27, 2026 |
Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Oct 11, 2017
Added
Nov 21, 2017
Modified
Mar 27, 2026
Description
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."
Solutions
ubuntu-upgrade-linux-image-4-10-0-1009-gcpubuntu-upgrade-linux-image-4-10-0-1021-raspi2ubuntu-upgrade-linux-image-4-10-0-40-genericubuntu-upgrade-linux-image-4-10-0-40-generic-lpaeubuntu-upgrade-linux-image-4-10-0-40-lowlatencyubuntu-upgrade-linux-image-4-11-0-1015-azureubuntu-upgrade-linux-image-4-13-0-1006-raspi2ubuntu-upgrade-linux-image-4-13-0-17-genericubuntu-upgrade-linux-image-4-13-0-17-generic-lpaeubuntu-upgrade-linux-image-4-13-0-17-lowlatencyubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-raspi2
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.