In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.The Linux kernel CVE team has assigned CVE-2024-36913 to this issue.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.The Linux kernel CVE team has assigned CVE-2024-36913 to this issue.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.The Linux kernel CVE team has assigned CVE-2024-36913 to this issue.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.The Linux kernel CVE team has assigned CVE-2024-36913 to this issue.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.The Linux kernel CVE team has assigned CVE-2024-36913 to this issue.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle theseerrors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.The Linux kernel CVE team has assigned CVE-2024-36913 to this issue.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.The Linux kernel CVE team has assigned CVE-2024-36913 to this issue.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In theLinux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.The Linux kernel CVE team has assigned CVE-2024-36913 to this issue.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.The Linux kernel CVE team has assigned CVE-2024-36913 to this issue.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In theLinux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leakpages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors toavoid returning decrypted (shared)memory to the page allocator,whichcould lead to functional or securityissues.VMBus codecould free decryptedpages if set_memory_encrypted()/decrypted()fails. Leak thepages if this happens.The Linux kernel CVE team has assigned CVE-2024-36913 to this issue.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
Inthe Linuxkernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pagesif set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoidreturning decrypted (shared)memory to the page allocator, whichcouldlead to functional or securityissues.VMBus code couldfree decrypted pagesif set_memory_encrypted()/decrypted()fails. Leak the pagesif this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle theseerrors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.
| linux | | https://git.kernel.org/linus/03f5a999adba062456c8c818a683beb1b498983a | https://git.kernel.org/linus/1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:Drivers: hv: vmbus: Leak pages if set_memory_encrypted() failsIn CoCo VMs it is possible for the untrusted host to causeset_memory_encrypted() or set_memory_decrypted() to fail such that anerror is returned and the resulting memory is shared. Callers need totake care to handle these errors to avoid returning decrypted (shared)memory to the page allocator, which could lead to functional or securityissues.VMBus code could free decrypted pages if set_memory_encrypted()/decrypted()fails. Leak the pages if this happens.