Date: Mon, 16 May 2016 17:30:16 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> cc: Radim Krcmar <rkrcmar@...hat.com>, Paolo Bonzini <pbonzini@...hat.com>, Salvatore Bonaccorso <carnil@...ian.org> Subject: CVE-2016-3713 Linux kernel: kvm: OOB r/w access issue with MSR 0x2F8 Hello, Linux kernel built with the Kernel-based Virtual Machine(CONFIG_KVM) with variable Memory Type Range Registers(MTRR) support is vulnerable to an out-of-bounds r/w access issue. It could occur while accessing processor's MTRRs via ioctl(2) calls. A privileged user inside guest could use this flaw to manipulate host kernel's memory bytes leading to information disclosure OR potentially crashing the kernel resulting in DoS. 'CVE-2016-3713' has been assigned to this issue by Red Hat Inc. A proposed patch is attached herein to fix this issue. Reference: -> https://bugzilla.redhat.com/show_bug.cgi?id=1332139 This issue was reported by Mr David Matlack of Google Inc. Thank you. -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F View attachment "KVM-MTRR-remove-MSR-0x2f8.patch" of type "text/plain" (1644 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ