Bug 1492984 (CVE-2017-12168) - CVE-2017-12168 Kernel: kvm: ARM64: assert failure when accessing PMCCNTR register
Summary: CVE-2017-12168 Kernel: kvm: ARM64: assert failure when accessing PMCCNTR regi...
Status: CLOSED NOTABUG
Alias: CVE-2017-12168
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20161118,repor...
Keywords: Security
Depends On: 1403106
Blocks: 1403799
TreeView+ depends on / blocked
 
Reported: 2017-09-19 05:49 UTC by Prasad J Pandit
Modified: 2019-06-08 22:21 UTC (History)
46 users (show)

(edit)
An assertion failure issue was found in the Linux kernel's KVM hypervisor module built to support visualization on ARM64 architecture platforms. The failure could occur while accessing Performance Monitors Cycle Count Register (PMCCNTR) from a guest. A privileged guest user could use this flaw to crash the host kernel resulting in denial of service.
Clone Of:
(edit)
Last Closed: 2017-11-09 15:10:33 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHEA-2017:3163 normal SHIPPED_LIVE new packages: kernel-alt 2017-11-09 14:59:25 UTC

Description Prasad J Pandit 2017-09-19 05:49:17 UTC
Linux kernel built for the ARM64(CONFIG_ARM64) architecture platform with
KVM virtualisation(CONFIG_KVM) support is vulnerable to an assert failure
issue. It could occur while accessing Performance Monitors Cycle Count
Register(PMCCNTR).

A privileged guest user/process could use this flaw to crash the host
kernel resulting in DoS.

Upstream patch:
---------------
  -> https://git.kernel.org/linus/9e3f7a29694049edd728e2400ab57ad7553e5aa9

Comment 4 Eric Christensen 2017-09-19 14:51:48 UTC
Statement:

This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.


Note You need to log in before you can comment on or make changes to this bug.