A flaw was found in the KVM's AMD nested virtualization (SVM). A malicious L1 guest could purposely fail to intercept the shutdown of a cooperative nested guest (L2), possibly leading to a page fault and kernel panic in the host (L0).
Upstream patch: https://lore.kernel.org/lkml/20221020093055.224317-5-mlevitsk@redhat.com/T/
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2136837]
Upstream commit: https://github.com/torvalds/linux/commit/ed129ec9057f89d615ba0c81a4984a90345a1684
This was fixed for Fedora with the 6.0.11 stable kernel updates.
Hello , I noticed that the bugs raised in kernel side are CLOSED WONTFIX , are we going to still track this issue? Thanks.
In reply to comment #8: > I noticed that the bugs raised in kernel side are CLOSED WONTFIX , are we > going to still track this issue? Hi, not sure what you mean by "track this issue" but the answer is most likely no, there are no plans to address this issue in RHEL. Please refer to https://access.redhat.com/security/cve/CVE-2022-3344.