Stack-based Buffer Overflow Affecting kernel-rt-debug package, versions <0:3.10.0-693.21.1.rt56.639.el7
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-KERNELRTDEBUG-4792646
- published 26 Jul 2021
- disclosed 10 Oct 2017
Introduced: 10 Oct 2017
CVE-2017-12188 Open this link in a new tabHow to fix?
Upgrade RHEL:7
kernel-rt-debug
to version 0:3.10.0-693.21.1.rt56.639.el7 or higher.
This issue was patched in RHSA-2018:0412
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-rt-debug
package and not the kernel-rt-debug
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."