Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 01 Apr 2009 12:06:54 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: KVM: VMX: Dont allow uninhibited access to EFER
 on i386

According to the upstream commit 16175a79, vmx_set_msr() does not allow
i386 guests to touch EFER but they can do so through the default: label.
If does not check if they set EFER_LME, so they can oops the host. Fix
by having EFER access through the normal channel (which will check for
EFER_LME) even on i386.

This bug was introduced in upstream commit 6aa8b732ca (Dec 10, 2006).

http://git.kernel.org/linus/6aa8b732ca01c3d7a54e93f4d701b8aabbe60fb7
http://git.kernel.org/linus/3bab1f5dda3443043cc8fe68c5ae75530339f28f

Thanks, Eugene
-- 
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ