Bug 1414735 - (CVE-2017-2583) CVE-2017-2583 Kernel: Kvm: vmx/svm potential privilege escalation inside guest
CVE-2017-2583 Kernel: Kvm: vmx/svm potential privilege escalation inside guest
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170112,repor...
: Security
Depends On: 1414745 1414736 1414742 1414743 1414744
Blocks: 1412139
  Show dependency treegraph
 
Reported: 2017-01-19 05:51 EST by Prasad J Pandit
Modified: 2018-02-07 18:23 EST (History)
34 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Prasad J Pandit 2017-01-19 05:51:11 EST
Linux kernel built with the Kernel-based Virtual Machine(CONFIG_KVM) support
is vulnerable an incorrect segment selector(SS) value error. It could occur
loading values into SS register in long mode. 

A user/process inside guest could use this flaw to crash the guest resulting
in DoS or potentially escalate their privileges inside guest.

Upstream patch:
---------------
  -> https://git.kernel.org/linus/33ab91103b3415e12457e3104f0e4517ce12d0f3

Note: On Intel CPUs it'd corrupt the guest state resulting in DoS; Whereas on
      AMD CPUs it could potentially escalate privileges inside guest.

Reference:
----------
  -> http://www.openwall.com/lists/oss-security/2017/01/19/2
Comment 1 Prasad J Pandit 2017-01-19 05:51:40 EST
Acknowledgments:

Name: Xiaohan Zhang (Huawei Inc.)
Comment 2 Prasad J Pandit 2017-01-19 05:53:57 EST
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1414736]
Comment 3 Prasad J Pandit 2017-01-19 05:58:27 EST
Statement:

This issue does not affect the versions of the kernel package as shipped with
Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7
may address this issue.
Comment 7 errata-xmlrpc 2017-06-28 13:04:34 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1615 https://access.redhat.com/errata/RHSA-2017:1615
Comment 8 errata-xmlrpc 2017-06-28 13:08:03 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1616 https://access.redhat.com/errata/RHSA-2017:1616

Note You need to log in before you can comment on or make changes to this bug.