{"id":"CVE-2018-12207","details":"Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.","modified":"2026-04-16T01:43:25.226953735Z","published":"2019-11-14T20:15:11.133Z","related":["SUSE-SU-2019:14218-1","SUSE-SU-2019:2946-1","SUSE-SU-2019:2947-1","SUSE-SU-2019:2948-1","SUSE-SU-2019:2949-1","SUSE-SU-2019:2950-1","SUSE-SU-2019:2951-1","SUSE-SU-2019:2952-1","SUSE-SU-2019:2953-1","SUSE-SU-2019:2954-1","SUSE-SU-2019:2955-1","SUSE-SU-2019:2956-1","SUSE-SU-2019:2960-1","SUSE-SU-2019:2961-1","SUSE-SU-2019:2962-1","SUSE-SU-2019:2984-1","SUSE-SU-2019:3294-1","SUSE-SU-2019:3295-1","SUSE-SU-2019:3297-1","SUSE-SU-2019:3340-1","SUSE-SU-2019:3348-1","SUSE-SU-2020:0093-1","SUSE-SU-2020:0334-1","SUSE-SU-2020:0388-1","SUSE-SU-2020:14444-1","openSUSE-SU-2019:2503-1","openSUSE-SU-2019:2505-1","openSUSE-SU-2019:2506-1","openSUSE-SU-2019:2507-1","openSUSE-SU-2019:2510-1","openSUSE-SU-2019:2710-1","openSUSE-SU-2024:11287-1","openSUSE-SU-2024:11396-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/"},{"type":"WEB","url":"https://support.f5.com/csp/article/K17269881?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4186-2/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4602"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3916"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0026"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2020/Jan/21"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0028"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0204"},{"type":"ADVISORY","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-56"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3936"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3941"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujul2020.html"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]},{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"11.5.2"},{"last_affected":"11.6.5"}]},{"events":[{"introduced":"12.1.0"},{"last_affected":"12.1.5"}]},{"events":[{"introduced":"13.1.0"},{"last_affected":"13.1.3"}]},{"events":[{"introduced":"14.1.0"},{"last_affected":"14.1.2"}]},{"events":[{"introduced":"15.0.0"},{"last_affected":"15.0.1"}]},{"events":[{"introduced":"5.2.0"},{"last_affected":"5.4.0"}]},{"events":[{"introduced":"6.0.0"},{"last_affected":"6.1.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.1.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.2"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.7"}]},{"events":[{"introduced":"0"},{"last_affected":"11"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-12207.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H"}]}