Stack-based Buffer Overflow Affecting kernel package, versions <0:3.10.0-693.21.1.el7
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-KERNEL-2097477
- published 26 Jul 2021
- disclosed 10 Oct 2017
Introduced: 10 Oct 2017
CVE-2017-12188 Open this link in a new tabHow to fix?
Upgrade Centos:7
kernel
to version 0:3.10.0-693.21.1.el7 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel
package and not the kernel
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."