From: He Zhe <zhe...@windriver.com> Sent: Wednesday, April 9, 2025 11:15 PM
> 
> Hello,
> 
> I'm investigating if v5.15 and early versions are vulnerable to the following 
> CVEs. Could
> you please help confirm the following cases?
> 
> For CVE-2024-36912, the suggested fix is 211f514ebf1e ("Drivers: hv: vmbus: 
> Track
> decrypted status in vmbus_gpadl") according to 
> https://www.cve.org/CVERecord?id=CVE-2024-36912 
> It seems 211f514ebf1e is based on d4dccf353db8 ("Drivers: hv: vmbus: Mark 
> vmbus
> ring buffer visible to host in Isolation VM") which was introduced since 
> v5.16. For v5.15
> and early versions, vmbus ring buffer hadn't been made visible to host, so 
> there's no
> need to backport 211f514ebf1e to those versions, right?
> 
> For CVE-2024-36913, the suggested fix is 03f5a999adba ("Drivers: hv: vmbus: 
> Leak
> pages if set_memory_encrypted() fails") according to 
> https://www.cve.org/CVERecord?id=CVE-2024-36913
> It seems 03f5a999adba is based on f2f136c05fb6 ("Drivers: hv: vmbus: Add SNP
> support for VMbus channel initiate message") which was introduced since 
> v5.16. For
> v5.15 and early verions, monitor pages hadn't been made visible to host, so 
> there's no
> need to backport 03f5a999adba to those versions, right?
> 

I agree with your conclusions. The two CVE's you list are for Confidential 
Computing
virtual machines. Support for CoCo VMs (called "Isolation VMs" in commits
d4dccf353db8 and f2f136c05fb6) on Hyper-V was first added in Linux kernel
version 5.16. So the fixes for the CVEs don't need to be backported to any
versions earlier than 5.16.

Michael Kelley


Reply via email to