[kernel-sec-discuss] r4993 - dsa-texts

Ben Hutchings benh at moszumanska.debian.org
Wed Feb 22 13:49:44 UTC 2017


Author: benh
Date: 2017-02-22 13:49:44 +0000 (Wed, 22 Feb 2017)
New Revision: 4993

Modified:
   dsa-texts/3.16.39-1+deb8u1
Log:
Add descriptions of KVM issues to DSA text for 3.16.39-1+deb8u1

Modified: dsa-texts/3.16.39-1+deb8u1
===================================================================
--- dsa-texts/3.16.39-1+deb8u1	2017-02-22 13:32:21 UTC (rev 4992)
+++ dsa-texts/3.16.39-1+deb8u1	2017-02-22 13:49:44 UTC (rev 4993)
@@ -29,8 +29,25 @@
     escalation.
 
 CVE-2017-2583
+
+    Xiaohan Zhang reported that KVM for amd64 does not correctly
+    emulate loading of a null stack selector.  This can be used by a
+    user in a guest VM for denial of service (on an Intel CPU) or to
+    escalate privileges within the VM (on an AMD CPU).
+
 CVE-2017-2584
+
+    Dmitry Vyukov reported that KVM for x86 does not correctly emulate
+    memory access by the SGDT and SIDT instructions, which can result
+    in a use-after-free and information leak.
+
 CVE-2017-2596
+
+    Dmitry Vyukov reported that KVM leaks page references when
+    emulating a VMON for a nested hypervisor.  This can be used by a
+    privileged user in a guest VM for denial of service or possibly
+    to gain privileges in the host.
+
 CVE-2017-2618
 
     It was discovered that an off-by-one in the handling of SELinux




More information about the kernel-sec-discuss mailing list