New issue
Advanced search Search tips

Issue 781519 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner:
Closed: Dec 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 1
Type: Bug-Security



Sign in to add a comment

CVE-2017-12188 CrOS: Vulnerability reported in Linux kernel

Project Member Reported by vomit.go...@appspot.gserviceaccount.com, Nov 4 2017

Issue description

VOMIT (go/vomit) has received an external vulnerability report for the Linux kernel. 

Advisory: CVE-2017-12188
  Details: http://vomit.googleplex.com/advisory?id=CVE/CVE-2017-12188
  CVSS severity score: 6.9/10.0
  Description:

arch/x86/kvm/mmu.c in the Linux kernel through 4.13.5, when nested virtualisation is used, does not properly traverse guest pagetable entries to resolve a guest virtual address, which allows L1 guest OS users to execute arbitrary code on the host OS or cause a denial of service (incorrect index during page walking, and host OS crash), aka an "MMU potential stack buffer overrun."



This bug was filed by http://go/vomit
Please contact us at vomit-team@google.com if you need any assistance.

 
Cc: wonderfly@google.com
Labels: Security_Severity-High Security_Impact-Stable M-63 Pri-1
Owner: groeck@chromium.org
Status: Assigned (was: Untriaged)
fd19d3b45164 KVM: nVMX: update last_nonleaf_level when initializing nested EPT

Status: ExternalDependency (was: Assigned)
Backport is non-trivial. Will wait for upstream resolution to avoid later conflicts.

Cc: rkolchmeyer@google.com
Labels: -M-63 M-65
Status: WontFix (was: ExternalDependency)
Upstream commit 829ee279aed4 ("KVM: MMU: always terminate page walks at level 1") says:

"This patch is also enough to fix CVE-2017-12188".
And:
"Fixes: 6bb69c9b69c315200ddc2bc79aee14c0184cf5b2"

Commit 6bb69c9b69c in turn is not in v4.4 and thus also not in chromeos-4.4 or earlier kernels. Thus, the problem does not apply to any chromeos kernels. Marking as WontFix.


Sign in to add a comment