摘要:
In the Linux kernel, the following vulnerability has been resolved:
kvm: LAPIC: Restore guard to prevent illegal APIC register access
Per the SDM, "any access that touches bytes 4 through 15 of an APIC
register may cause undefined behavior and must not be executed."
Worse, such an access in kvm_lapic_reg_read can result in a leak of
kernel stack contents. Prior to commit 01402cf81051 ("kvm: LAPIC:
write down valid APIC registers"), such an access was explicitly
disallowed. Restore the guard that was removed in that commit.
安全等级: Low
公告ID: KylinSec-SA-2024-2887
发布日期: 2024年6月26日
关联CVE: CVE-2021-47255
In the Linux kernel, the following vulnerability has been resolved:
kvm: LAPIC: Restore guard to prevent illegal APIC register access
Per the SDM, "any access that touches bytes 4 through 15 of an APIC
register may cause undefined behavior and must not be executed."
Worse, such an access in kvm_lapic_reg_read can result in a leak of
kernel stack contents. Prior to commit 01402cf81051 ("kvm: LAPIC:
write down valid APIC registers"), such an access was explicitly
disallowed. Restore the guard that was removed in that commit.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2021-47255 | KY3.4-5 | kernel | Unaffected |
CVE-2021-47255 | KY3.5.3 | kernel | Unaffected |
CVE-2021-47255 | V6 | kernel | Unaffected |