First published: Wed Dec 10 2014(Updated: )
It was found that espfix funcionality (when returning to userspace with a 16 bit stack, the CPU will not restore the high word of esp for us on executing iret and thus potentially leaks kernel addresses; espfix fixes this) does not work for 32-bit KVM paravirt guests. A local unprivileged user could potentially use this flaw to leak kernel stack addresses. Proposed upstream patch: <a href="http://www.spinics.net/lists/kvm/msg111458.html">http://www.spinics.net/lists/kvm/msg111458.html</a> Acknowledgements: Red Hat would like to thank Andy Lutomirski for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.18 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
openSUSE Evergreen | =11.4 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Server | =11-sp2 | |
Oracle Linux | =6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | <=3.18 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8134 is considered to be of medium severity due to its potential exploitation by local unprivileged users.
To fix CVE-2014-8134, update the Linux kernel to versions 5.10.223-1, 5.10.226-1, 6.1.123-1, or later versions.
CVE-2014-8134 affects various distributions including Debian, Ubuntu 12.04, 14.04, 16.04, openSUSE 13.1, and others.
CVE-2014-8134 can be exploited by local unprivileged users with access to a 32-bit KVM paravirt guest.
CVE-2014-8134 affects the espfix functionality, which may leak kernel addresses in certain conditions.