Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 01 Apr 2009 12:06:54 +0800
From: Eugene Teo <>
CC: "Steven M. Christey" <>
Subject: CVE request: kernel: KVM: VMX: Dont allow uninhibited access to EFER
 on i386

According to the upstream commit 16175a79, vmx_set_msr() does not allow
i386 guests to touch EFER but they can do so through the default: label.
If does not check if they set EFER_LME, so they can oops the host. Fix
by having EFER access through the normal channel (which will check for
EFER_LME) even on i386.

This bug was introduced in upstream commit 6aa8b732ca (Dec 10, 2006).

Thanks, Eugene
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ