CVE-2020-2732 log

Source
Severity High
Remote No
Type Information disclosure
Description
An issue has been found in KVM before 5.5.7, where vmx_check_intercept ws is not yet fully implemented on Intel processors, causing e.g. the I/O or MSR interception bitmaps not to be checked. This in turn allowed the L2 guest to trick the L0 hypervisor into accessing sensitive information on the L1 hypervisor.
Group Package Affected Fixed Severity Status Ticket
AVG-1108 linux 5.5.6.arch1-1 5.5.7.arch1-1 High Fixed
Date Advisory Group Package Severity Type
08 Mar 2020 ASA-202003-6 AVG-1108 linux High multiple issues
References
https://www.openwall.com/lists/oss-security/2020/02/25/3
https://www.spinics.net/lists/kvm/msg208259.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=07721feee46b4b248402133228235318199b05ec
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35a571346a94fb93b5b3b6a599675ef3384bc75c
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e71237d3ff1abf9f3388337cfebf53b96df2020d