Date: Wed, 01 Apr 2009 12:06:54 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org> Subject: CVE request: kernel: KVM: VMX: Dont allow uninhibited access to EFER on i386 According to the upstream commit 16175a79, vmx_set_msr() does not allow i386 guests to touch EFER but they can do so through the default: label. If does not check if they set EFER_LME, so they can oops the host. Fix by having EFER access through the normal channel (which will check for EFER_LME) even on i386. This bug was introduced in upstream commit 6aa8b732ca (Dec 10, 2006). http://git.kernel.org/linus/6aa8b732ca01c3d7a54e93f4d701b8aabbe60fb7 http://git.kernel.org/linus/3bab1f5dda3443043cc8fe68c5ae75530339f28f Thanks, Eugene -- Eugene Teo / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ