group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #50066
[Bug 2124105] Re: VMSCAPE CVE-2025-40300
** Changed in: linux (Ubuntu Jammy)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Noble)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Plucky)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Questing)
Status: In Progress => Fix Released
** Changed in: linux (Ubuntu Questing)
Status: Fix Released => Fix Committed
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/2124105
Title:
VMSCAPE CVE-2025-40300
Status in linux package in Ubuntu:
In Progress
Status in linux source package in Trusty:
Fix Committed
Status in linux source package in Xenial:
Fix Committed
Status in linux source package in Bionic:
Fix Committed
Status in linux source package in Focal:
Fix Committed
Status in linux source package in Jammy:
Fix Committed
Status in linux source package in Noble:
Fix Committed
Status in linux source package in Plucky:
Fix Committed
Status in linux source package in Questing:
Fix Committed
Bug description:
[ Impact ]
VMSCAPE is a vulnerability, affecting a broad range of amd64 CPUs,
that may allow a guest to influence the branch prediction in host userspace.
It particularly affects hypervisors like QEMU.
Even if a hypervisor may not have any sensitive data like disk encryption keys,
guest-userspace may be able to attack the guest-kernel using the hypervisor
as a confused deputy.
[ Fix ]
Backport the following patchset to all affected series:
- 9969779d0803 Documentation/hw-vuln: Add VMSCAPE documentation
- a508cec6e521 x86/vmscape: Enumerate VMSCAPE bug
- 2f8f173413f1 x86/vmscape: Add conditional IBPB mitigation
- 556c1ad666ad x86/vmscape: Enable the mitigation
- 6449f5baf9c7 x86/bugs: Move cpu_bugs_smt_update() down
- b7cc98872315 x86/vmscape: Warn when STIBP is disabled with SMT
- 8a68d64bb103 x86/vmscape: Add old Intel CPUs to affected list
[ Test Plan ]
Boot the kernel on a system having a vulnerable CPU.
Fine tune the PoC (https://github.com/comsec-group/vmscape/tree/main/vmscape)
considering the CPU on which the kernel is running.
Run the PoC and make sure that it fails.
[ Regression Potential ]
The regression potential is moderate, since the patches add conditional
IBPB flushing on VMEXIT for the CPUs affected by the vulnerability.
Any issue would be limited to measurable performance regressions for
VM heavy workload that trigger frequent VMEXITs (due to IBPB overhead).
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2124105/+subscriptions
References