Bug 1414735 (CVE-2017-2583) - CVE-2017-2583 Kernel: Kvm: vmx/svm potential privilege escalation inside guest
Summary: CVE-2017-2583 Kernel: Kvm: vmx/svm potential privilege escalation inside guest
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2017-2583
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1414736 1414742 1414743 1414744 1414745
Blocks: 1412139
TreeView+ depends on / blocked
 
Reported: 2017-01-19 10:51 UTC by Prasad Pandit
Modified: 2021-02-17 02:44 UTC (History)
30 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest.
Clone Of:
Environment:
Last Closed: 2019-06-08 03:05:45 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:1615 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2017-06-29 16:41:56 UTC
Red Hat Product Errata RHSA-2017:1616 0 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2017-06-28 20:57:58 UTC

Description Prasad Pandit 2017-01-19 10:51:11 UTC
Linux kernel built with the Kernel-based Virtual Machine(CONFIG_KVM) support
is vulnerable an incorrect segment selector(SS) value error. It could occur
loading values into SS register in long mode. 

A user/process inside guest could use this flaw to crash the guest resulting
in DoS or potentially escalate their privileges inside guest.

Upstream patch:
---------------
  -> https://git.kernel.org/linus/33ab91103b3415e12457e3104f0e4517ce12d0f3

Note: On Intel CPUs it'd corrupt the guest state resulting in DoS; Whereas on
      AMD CPUs it could potentially escalate privileges inside guest.

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2017/01/19/2

Comment 1 Prasad Pandit 2017-01-19 10:51:40 UTC
Acknowledgments:

Name: Xiaohan Zhang (Huawei Inc.)

Comment 2 Prasad Pandit 2017-01-19 10:53:57 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1414736]

Comment 3 Prasad Pandit 2017-01-19 10:58:27 UTC
Statement:

This issue does not affect the versions of the kernel package as shipped with
Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7
may address this issue.

Comment 7 errata-xmlrpc 2017-06-28 17:04:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1615 https://access.redhat.com/errata/RHSA-2017:1615

Comment 8 errata-xmlrpc 2017-06-28 17:08:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1616 https://access.redhat.com/errata/RHSA-2017:1616


Note You need to log in before you can comment on or make changes to this bug.