Linux kernel built with the Kernel-based Virtual Machine(CONFIG_KVM) with variable Memory Type Range Registers(MTRR) support is vulnerable to an out-of-bounds r/w access issue. It could occur while accessing processor's MTRRs via ioctl(2) calls. A privileged user inside guest could use this flaw to manipulate host kernel's memory bytes leading to information disclosure or crashing the kernel resulting in DoS. Upstream patch: --------------- -> https://lkml.org/lkml/2016/5/17/350 Reference: ---------- -> http://www.openwall.com/lists/oss-security/2016/05/16/2
Acknowledgments: Name: David Matlack (Google)
Created attachment 1152898 [details] Proposed patch
Statement: This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1336410]
kernel-4.5.5-300.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
kernel-4.4.11-200.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
kernel-4.5.5-201.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.