** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-azure in Ubuntu. https://bugs.launchpad.net/bugs/1834364
Title: [linux-azure] Potential Hyper-V infoleak in NVMe Direct Status in linux-azure package in Ubuntu: New Bug description: The standard Linux NVMe driver allocates a kernel memory buffer that is passed to the NVMe controller, but the driver does not initialize the memory buffer to zero or any other value. It invokes the NVMe function, which, in a Hyper-V guest, may not fill the entire buffer. The driver then copies the buffer, including potentially uninitialized bytes, back to user space. This has been fixed in Linux 4.20 with the following two patches (the 1st patch had a bug, so the 2nd patch fixed the 1st patch). The commits appear to have been cc'd to upstream stable. However, since this is a security issue, we wanted to get them pulled into the linux- azure kernels. f3587d76da05 ("block: Clear kernel memory before copying to user") f55adad601c6 ("block/bio: Do not zero user pages") To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1834364/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp