Issue metadata
Sign in to add a comment
|
Security: KVM (nested virtualization): privilege escalation in L1 guest| |
||||||||||||||||||||||||
Issue descriptionSee https://bugs.chromium.org/p/project-zero/issues/detail?id=1589 for details. Affects KVM in the Linux kernel between 4.12 and 4.18rc1. Fix at https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/arch/x86/kvm?id=727ba748e110b4de50d142edca9d6a9b7e6111d8 I guess we'll likely get this fix as part of the 4.14 stable update. Sec_Impact is none because we don't enable nested virt for now, but we should try to pick up the fix just in case, but Sec_Severity is high because something this close to a VM escape is Kind of a Big Deal.
,
Jun 27 2018
Thanks for the update.
,
Jun 27 2018
Lakitu doesn't support nested KVM yet so having the fix at head is fine.
,
Jun 27 2018
#3: Excellent. Marking as Duplicate of merge commit.
,
Oct 4
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||
Comment 1 by groeck@chromium.org
, Jun 27 2018Labels: CVE-2018-12904
Owner: groeck@chromium.org
Status: Assigned (was: Available)