An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.
Link | Tags |
---|---|
https://bugs.chromium.org/p/project-zero/issues/detail?id=2309 | patch third party advisory issue tracking |
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.18.17 | patch vendor advisory release notes |
https://github.com/torvalds/linux/commit/6cd88243c7e03845a450795e134b488fc2afb736 | third party advisory patch |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6cd88243c7e03845a450795e134b488fc2afb736 | patch vendor advisory |
https://security.netapp.com/advisory/ntap-20230214-0007/ | third party advisory |
https://www.debian.org/security/2023/dsa-5480 | vendor advisory third party advisory vdb entry |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | mailing list |