oss-sec mailing list archives
CVE request: kernel: KVM: VMX: Dont allow uninhibited access to EFER on i386
From: Eugene Teo <eugene () redhat com>
Date: Wed, 01 Apr 2009 12:06:54 +0800
According to the upstream commit 16175a79, vmx_set_msr() does not allow i386 guests to touch EFER but they can do so through the default: label. If does not check if they set EFER_LME, so they can oops the host. Fix by having EFER access through the normal channel (which will check for EFER_LME) even on i386. This bug was introduced in upstream commit 6aa8b732ca (Dec 10, 2006). http://git.kernel.org/linus/6aa8b732ca01c3d7a54e93f4d701b8aabbe60fb7 http://git.kernel.org/linus/3bab1f5dda3443043cc8fe68c5ae75530339f28f Thanks, Eugene -- Eugene Teo / Red Hat Security Response Team
Current thread:
- CVE request: kernel: KVM: VMX: Dont allow uninhibited access to EFER on i386 Eugene Teo (Mar 31)