** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
** Description changed:
- paravirt_enabled has the following effects: - Disables the F00F bug
- workaround warning. There is no F00F bug workaround any more because
- Linux's standard IDT handling already works around the F00F bug, but
- the warning still exists. This is only cosmetic, and, in any event,
- there is no such thing as KVM on a CPU with the F00F bug. - Disables
- 32-bit APM BIOS detection. On a KVM paravirt system, there should be
- no APM BIOS anyway. - Disables tboot. I think that the tboot code
- should check the CPUID hypervisor bit directly if it matters. -
- paravirt_enabled disables espfix32. espfix32 should *not* be disabled
- under KVM paravirt. The last point is the purpose of this patch. It
- fixes a leak of the high 16 bits of the kernel stack address on 32-bit
- KVM paravirt guests. While I'm at it, this removes pv_info setup from
- kvmclock. That code seems to serve no purpose.
+ The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux
+ kernel through 3.18 uses an improper paravirt_enabled setting for KVM
+ guest kernels, which makes it easier for guest OS users to bypass the
+ ASLR protection mechanism via a crafted application that reads a 16-bit
+ value.
Break-Fix: - local-2014-8134
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1400314
Title:
CVE-2014-8134
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1400314/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs