The existing KVM SEV API has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest VM instance in AMD CPU that supports Secure Encrypted Virtualization (SEV).Īn issue was discovered in the Linux kernel for powerpc before 5.14.15. This flaw affects Linux kernel versions prior to 5.17-rc4.Ī flaw was found in the Linux kernel. This flaw allows a local attacker with a normal user privilege to obtain unauthorized memory write access. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.Ī vulnerability was found in kvm_s390_guest_sida_op in the arch/s390/kvm/kvm-s390.c function in KVM for s390 in the Linux kernel. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.Ī flaw was found in KVM. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.Ī NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. This flaw occurs while executing an illegal instruction in guest in the Intel CPU. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.Ī NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.Ī flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ. An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |