|
Message-ID: <2025010626-unhearing-dealmaker-27de@gregkh> Date: Mon, 6 Jan 2025 19:19:08 +0100 From: Greg KH <greg@...ah.com> To: oss-security@...ts.openwall.com Subject: Re: Linux: general protection fault in __vmx_vcpu_run with nested virtualization On Mon, Jan 06, 2025 at 05:01:49PM +0800, Linfeng Sun wrote: > Hello list, > > A bug has been detected in the Linux kernel's nested virtualization implementation, which > can lead to a general protection fault in __vmx_vcpu_run when running a higher > version L1 hypervisor kernel on an L0 host kernel version predating the following > commit: https://github.com/torvalds/linux/commit/45779be5ced626db836e612e0dc638a1601abcf2 For those wanting to understand this, that means that any kernel version from release of: 3.17 to the following releases: 4.9.331 4.14.296 4.19.262 5.4.220 5.10.150 5.15.75 5.19.17 6.0.3 6.1 is vulnerable, and anything newer than that (i.e. any kernel newer than August of 2022) is just fine. Hopefully everyone here is running a kernel newer than August of 2022, but hey, who knows! hope this helps, greg k-h
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.