Date: Tue, 26 Sep 2017 10:26:27 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> cc: Jim Mattson <jmattson@...gle.com> Subject: CVE-2017-12154 Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register Hello, Linux kernel built with the KVM virtualisation support(CONFIG_KVM), with nested virtualisation(nVMX) feature enabled(nested=1), is vulnerable to a crash due to disabled external interrupts. As L2 guest could access(r/w) hardware CR8 register of the host(L0). In a nested virtualisation setup, L2 guest user could use this flaw to potentially crash the host(L0) resulting in DoS. Upstream patch -------------- -> https://git.kernel.org/linus/51aa68e7d57e3217192d88ce90fd5b8ef29ec94f This issue was reported by Jim Mattson of Google.com. Thank you. -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ