Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 293530

Summary: Kernel: KVM MCE "KVM_X86_SETUP_MCE" Buffer Overflow
Product: Gentoo Security Reporter: cilly <cilly>
Component: KernelAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: normal CC: hardened-kernel+disabled, kernel
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=a9e38c3e01ad242fe2a625354cf065c34b01e3aa
Whiteboard: [linux <2.6.32]
Package list:
Runtime testing required: ---

Description cilly 2009-11-17 18:45:30 UTC
DESCRIPTION:
A vulnerability has been reported in the Linux Kernel, which can be
exploited by malicious, local users to cause a DoS (Denial of
Service) and potentially gain escalated privileges.

The vulnerability is caused due to an error within the
"kvm_vcpu_ioctl_x86_setup_mce()" function in arch/x86/kvm/x86.c. This
can be exploited to corrupt kernel memory by e.g. sending a specially
crafted "KVM_X86_SETUP_MCE" IOCTL.

SOLUTION:
Fixed in version 2.6.32.-rc7.

PROVIDED AND/OR DISCOVERED BY:
Disclosed in a GIT commit.

ORIGINAL ADVISORY:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=a9e38c3e01ad242fe2a625354cf065c34b01e3aa
Comment 1 Bjoern Tropf (RETIRED) gentoo-dev 2009-11-23 17:55:54 UTC

*** This bug has been marked as a duplicate of bug 294244 ***