Bugzilla – Bug 991065
VUL-1: CVE-2016-5412: kernel: powerpc: kvm: Infinite loop via H_CEDE hypercall when running under hypervisor-mode
Last modified: 2022-02-13 11:15:10 UTC
https://marc.info/?l=kvm&m=146968629127349&w=2 These two patches fix a denial-of-service vulnerability in the host kernel when running guests using HV-style KVM on POWER8 machines. It turns out that if a user process starts a transaction and then does an exec system call, it can not only crash the guest kernel but also cause one or more host CPUs to hang. This vulnerability has been assigned the ID CVE-2016-5412. This patch series is the fix for the vulnerability. I would like to get these patches into v4.8-rc1 and also into the stable trees. Paul. arch/powerpc/kvm/book3s_hv_rmhandlers.S | 462 +++++++++++++++++--------------- 1 file changed, 250 insertions(+), 212 deletions(-) References: https://bugzilla.redhat.com/show_bug.cgi?id=1349916 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5412
Created attachment 685880 [details] patch1
Created attachment 685881 [details] patch2
Transactional memory support is in kernels 3.9+, so SLE12+.
bugbot adjusting priority
This is an autogenerated message for IBS integration: This bug (991065) was mentioned in https://build.suse.de/request/show/118728 SLE-12-SP2 / kernel-source
openSUSE and older SLES still TBD.
still open I think
(In reply to Marcus Meissner from comment #10) > still open I think No, it's not. The fixes went into 4.1.31. f024ee098476a3e620232e4a78cfac505f121245 93d17397e4e2182fdaad503e2f9da46202c0f1c3 Thanks for the reminder. closing now.