Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 607808 (CVE-2017-2596)

Summary: Kernel: kvm: page reference leakage in handle_vmon
Product: Gentoo Security Reporter: Francis Booth <boothf>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: RESOLVED FIXED    
Severity: normal CC: kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://www.spinics.net/lists/kvm/msg144319.html
Whiteboard: A3 [ebuild]
Package list:
Runtime testing required: ---

Description Francis Booth 2017-01-31 14:29:36 UTC
Linux kernel built with the KVM virtualisation support(CONFIG_KVM), with nested virtualisation(nVMX) feature enabled(nested=1), is vulnerable to host memory leakage issue. It could occur while emulating VMXON instruction in 'handle_vmon'.

A L1 guest user could use this flaw to leak host memory potentially resulting in DoS.

Upstream patch:
---------------
  -> https://www.spinics.net/lists/kvm/msg144319.html

Reference:
----------
  -> https://bugzilla.redhat.com/show_bug.cgi?id=1417812


~ eleix (Security Padawan)


Reproducible: Didn't try
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-25 22:57:29 UTC
~/git/linux/torvalds $ fix_in_what_release 06ce521af9558814b8606c0476c54497cf83a653
3.18.50 4.4.63 4.9.24 4.10.10