Bug ID | 1013038 |
---|---|
Summary | VUL-0: kernel-source: kvm: stack memory information leakage |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 42.2 |
Hardware | Other |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Kernel |
Assignee | kernel-maintainers@forge.provo.novell.com |
Reporter | mikhail.kasimov@gmail.com |
QA Contact | qa-bugs@suse.de |
Found By | --- |
Blocker | --- |
Reference: http://seclists.org/oss-sec/2016/q4/547 =================================================== Hello, Linux kernel built with the Kernel-based Virtual Machine(CONFIG_KVM) support is vulnerable to an information leakage issue. It could occur on x86 platform, in 32bit mode, while emulating instructions. A user/process could use this flaw to leak host kernel memory bytes. Upstream patch: --------------- -> https://git.kernel.org/linus/2117d5398c81554fbf803f5fd1dc55eb78216c0c Reference: ---------- -> https://bugzilla.redhat.com/show_bug.cgi?id=1400468 Thank you. -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F =================================================== @It could occur on x86 platform, in 32bit mode, while emulating instructions. Acceptable for (open-)SUSE here?