|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: REJECTED: CVE-2023-52514: kernel: x86/reboot: VMCLEAR active VMCSes before emergency reboot | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | SMASH SMASH <smash_bz> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED INVALID | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | andrea.mattiazzo, jgross, mhocko, nik.borisov, osalvador, rfrohl |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/396063/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-52514:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) | ||
| Found By: | Security Response Team | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
SMASH SMASH
2024-03-06 08:04:42 UTC
I'd rate this as low severity issue that's not worth bothering, furthermore it's part of a larger series hardening the KVM code: https://lore.kernel.org/all/20230721201859.2307736-1-seanjc@google.com/ Ideally this should be judged by the virtualizatino people. If anything, this is a bug, but not a security issue. There is no way an unprivileged user (VM or process) could trigger this issue, as they can't cause the host to reboot. In case they could, THAT would be a vulnerability. So I'd say we can ignore it from the security POV. BTW, the related upstream patch is part of SLE15-SP6. You can Cc me. No valid CVE. Back to sec-team. All done, closing. |