** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Released
** Changed in: linux-lts-raring (Ubuntu Precise) Status: New => Invalid ** Description changed: - paravirt_enabled has the following effects: - Disables the F00F bug - workaround warning. There is no F00F bug workaround any more because - Linux's standard IDT handling already works around the F00F bug, but - the warning still exists. This is only cosmetic, and, in any event, - there is no such thing as KVM on a CPU with the F00F bug. - Disables - 32-bit APM BIOS detection. On a KVM paravirt system, there should be - no APM BIOS anyway. - Disables tboot. I think that the tboot code - should check the CPUID hypervisor bit directly if it matters. - - paravirt_enabled disables espfix32. espfix32 should *not* be disabled - under KVM paravirt. The last point is the purpose of this patch. It - fixes a leak of the high 16 bits of the kernel stack address on 32-bit - KVM paravirt guests. While I'm at it, this removes pv_info setup from - kvmclock. That code seems to serve no purpose. + The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux + kernel through 3.18 uses an improper paravirt_enabled setting for KVM + guest kernels, which makes it easier for guest OS users to bypass the + ASLR protection mechanism via a crafted application that reads a 16-bit + value. Break-Fix: - local-2014-8134 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1400314 Title: CVE-2014-8134 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1400314/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs