First published: Wed Dec 10 2014(Updated: )
It was found that espfix funcionality (when returning to userspace with a 16 bit stack, the CPU will not restore the high word of esp for us on executing iret and thus potentially leaks kernel addresses; espfix fixes this) does not work for 32-bit KVM paravirt guests. A local unprivileged user could potentially use this flaw to leak kernel stack addresses. Proposed upstream patch: <a href="http://www.spinics.net/lists/kvm/msg111458.html">http://www.spinics.net/lists/kvm/msg111458.html</a> Acknowledgements: Red Hat would like to thank Andy Lutomirski for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat QEMU-KVM |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1172765 is considered high due to the potential for local unprivileged users to leak kernel addresses.
To mitigate REDHAT-BUG-1172765, ensure that your KVM setup is updated to the latest patch that addresses this issue.
REDHAT-BUG-1172765 affects systems running the Red Hat KVM hypervisor with 32-bit KVM paravirt guests.
Exploitation of REDHAT-BUG-1172765 could potentially allow a local unprivileged user to retrieve sensitive kernel memory addresses.
REDHAT-BUG-1172765 was reported as a bug in the Red Hat bug tracking system.