CVE-2020-2732

Priority
Description
A flaw was discovered in the way that the KVM hypervisor handled
instruction emulation for an L2 guest when nested virtualisation is
enabled. Under some circumstances, an L2 guest may trick the L0 guest into
accessing sensitive L1 resources that should be inaccessible to the L2
guest.
Ubuntu-Description
Paulo Bonzini discovered that the KVM hypervisor implementation in the
Linux kernel could improperly let a nested (level 2) guest access the
resources of a parent (level 1) guest in certain situations. An attacker
could use this to expose sensitive information.
Notes
sbeattieonly systems running Intel processors are affected.
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (4.15.0-91.92)
Ubuntu 20.04 LTS:not-affected (5.4.0-18.22)
Ubuntu 16.04 ESM:released (4.4.0-176.206)
Ubuntu 14.04 ESM:ignored (was needed ESM criteria)
Patches:
Introduced by
8a76d7f25f8f24fc5a328c8e15e4a7313cf141b9
Fixed by
07721feee46b4b248402133228235318199b05ec
Introduced by
55d2375e58a61be072431dd3d3c8a320f4a4a01b
Fixed by
e71237d3ff1abf9f3388337cfebf53b96df2020d
Introduced by
fb6d4d340e0532032c808a9933eaaa7b8de435ab
Fixed by
35a571346a94fb93b5b3b6a599675ef3384bc75c
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1063.67)
Ubuntu 20.04 LTS:not-affected (5.4.0-1005.5)
Ubuntu 16.04 ESM:released (4.4.0-1104.115)
Ubuntu 14.04 ESM:released (4.4.0-1064.68)
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (5.0.0-1027.30)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 20.04 LTS:DNE
Ubuntu 16.04 ESM:released (4.15.0-1063.67~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (5.0.0-1035.37)
Ubuntu 20.04 LTS:not-affected (5.4.0-1006.6)
Ubuntu 16.04 ESM:released (4.15.0-1075.80)
Ubuntu 14.04 ESM:released (4.15.0-1074.79~14.04.1)
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (5.3.0-1016.17~18.04.1)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:ignored (was needs-triage now end-of-life)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (5.0.0-1033.34)
Ubuntu 20.04 LTS:not-affected (5.4.0-1005.5)
Ubuntu 16.04 ESM:released (4.15.0-1058.62)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (5.3.0-1014.15~18.04.1)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:ignored (was needs-triage now end-of-life)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1055.58)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (5.0.0-1032.33)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (5.3.0-1014.15~18.04.1)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (5.3.0-42.34~18.04.1)
Ubuntu 20.04 LTS:DNE
Ubuntu 16.04 ESM:released (4.15.0-91.92~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:ignored (was needs-triage now end-of-life)
Ubuntu 20.04 LTS:DNE
Ubuntu 16.04 ESM:ignored (was needs-triage now end-of-life)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1056.57)
Ubuntu 20.04 LTS:not-affected (5.4.0-1004.4)
Ubuntu 16.04 ESM:released (4.4.0-1068.75)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:released (4.4.0-176.206~14.04.1)
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1076.86)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:DNE
Ubuntu 20.04 LTS:not-affected (5.6.0-1007.7)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (5.0.0-1043.48)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (4.15.0-1035.39)
Ubuntu 20.04 LTS:not-affected (5.4.0-1005.5)
Ubuntu 16.04 ESM:released (4.15.0-1035.38~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:released (5.0.0-1013.18)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (5.6~rc4)
Ubuntu 18.04 LTS:not-affected (5.3.0-1011.12~18.04.1)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:not-affected (Intel only)
Ubuntu 18.04 LTS:not-affected (Intel only)
Ubuntu 20.04 LTS:ignored (was pending \[5.4.0-1006.6\] now end-of-life)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:not-affected (Intel only)
Ubuntu 18.04 LTS:not-affected (Intel only)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:not-affected (Intel only)
Ubuntu 18.04 LTS:not-affected (Intel only)
Ubuntu 20.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
More Information

Updated: 2022-04-13 14:18:30 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)