lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2024022905-barrette-lividly-c312@gregkh>
Date: Thu, 29 Feb 2024 06:21:04 +0100
From: Greg KH <gregkh@...nel.org>
To: Paolo Bonzini <pbonzini@...hat.com>
Cc: cve@...nel.org, linux-kernel@...r.kernel.org,
	KVM list <kvm@...r.kernel.org>,
	Vitaly Kuznetsov <vkuznets@...hat.com>
Subject: Re: CVE-2021-46978: KVM: nVMX: Always make an attempt to map eVMCS
 after migration

On Wed, Feb 28, 2024 at 11:09:50PM +0100, Paolo Bonzini wrote:
> On 2/28/24 09:14, Greg Kroah-Hartman wrote:
> > From: gregkh@...nel.org
> > 
> > Description
> > ===========
> > 
> > In the Linux kernel, the following vulnerability has been resolved:
> > 
> > KVM: nVMX: Always make an attempt to map eVMCS after migration
> 
> How does this break the confidentiality, integrity or availability of the
> host kernel?  It's a fix for a failure to restart the guest after migration.
> Vitaly can confirm.

It's a fix for the availability of the guest kernel, which now can not
boot properly, right?  That's why this was selected.  If this is not
correct, I will be glad to revoke this.

> Apparently the authority to "dispute or modify an assigned CVE lies solely
> with the maintainers", but we don't have the authority to tell you in
> advance that a CVE is crap, so please consider this vulnerability to be
> disputed.

Great, but again, not allowing the guest kernel to boot again feels like
an "availability" issue to me.  If not, we can revoke this.

> Unlike what we discussed last week:
> 
> - the KVM list is not CC'd so whoever sees this reply will have to find the
> original message on their own

Adding a cc: to the subsystem mailing list for the CVEs involved can be
done, but would it really help much?

> - there is no list gathering all the discussions/complaints about these
> CVEs, since I cannot reply to linux-cve-announce@...r.kernel.org.

That's what lkml is for, and is why the "Reply-to:" is set on the
linux-cve-announce emails.  Creating yet-another-list isn't really going
to help much.

Also, this is part of the "import the GSD database into CVE" which the
CVE project asked us to do, which is why these "old" issues are popping
up now.

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ