[SRU Bionic 0/1] CVE-2021-38198

Thadeu Lima de Souza Cascardo cascardo at canonical.com
Wed Sep 22 18:47:30 UTC 2021


[Impact]
 It was discovered that the KVM hypervisor implementation in the Linux
 kernel did not properly compute the access permissions for shadow pages in
 some situations. A local attacker could use this to cause a denial of
 service.

[Backport]
I picked up the backport that was done for 4.19.y, as there was a small
conflict in one of the hunks and a file rename.

[Test case]
kvm-unit-tests access test will check for this bug. It fails before the
fix and passes after the fix.

[Potential regression]
KVM guest page faults could be erronously handled, causing issues on
KVM guests.

Lai Jiangshan (1):
  KVM: X86: MMU: Use the correct inherited permissions to get shadow
    page

 Documentation/virtual/kvm/mmu.txt |  4 ++--
 arch/x86/kvm/paging_tmpl.h        | 14 +++++++++-----
 2 files changed, 11 insertions(+), 7 deletions(-)

-- 
2.30.2




More information about the kernel-team mailing list