Stack-based Buffer Overflow Affecting kernel-bootwrapper package, versions <0:3.10.0-693.21.1.el7
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-KERNELBOOTWRAPPER-4770140
- published 26 Jul 2021
- disclosed 10 Oct 2017
Introduced: 10 Oct 2017
CVE-2017-12188 Open this link in a new tabHow to fix?
Upgrade RHEL:7
kernel-bootwrapper
to version 0:3.10.0-693.21.1.el7 or higher.
This issue was patched in RHSA-2018:0395
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-bootwrapper
package and not the kernel-bootwrapper
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."