DescriptionA flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges.
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
|National Vulnerability Database|
|National Vulnerability Database||SUSE|
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise 15 Module for Basesystem||kernel-source||Already fixed|
|SUSE Linux Enterprise 15 Module for Development Tools||kernel-source||Already fixed|
|SUSE Linux Enterprise Desktop 12 SP3||kernel-source||Already fixed|
|SUSE Linux Enterprise Server 11 SP1||kernel-source||Already fixed|
|SUSE Linux Enterprise Server 11 SP3||kernel-source||Already fixed|
|SUSE Linux Enterprise Server 11 SP4||kernel-source||Already fixed|
|SUSE Linux Enterprise Server 12 SP3||kernel-source||Already fixed|