APPLIED[T]: [PATCH] kvm: nVMX: Don't allow L2 to access the hardware CR8
Khaled Elmously
khalid.elmously at canonical.com
Thu Jun 7 21:55:23 UTC 2018
Applied to Trusty
On 2018-06-06 15:22:39 , Stefan Bader wrote:
> From: Jim Mattson <jmattson at google.com>
>
> If L1 does not specify the "use TPR shadow" VM-execution control in
> vmcs12, then L0 must specify the "CR8-load exiting" and "CR8-store
> exiting" VM-execution controls in vmcs02. Failure to do so will give
> the L2 VM unrestricted read/write access to the hardware CR8.
>
> This fixes CVE-2017-12154.
>
> Signed-off-by: Jim Mattson <jmattson at google.com>
> Reviewed-by: David Hildenbrand <david at redhat.com>
> Signed-off-by: Paolo Bonzini <pbonzini at redhat.com>
>
> CVE-2017-12154
>
> (backported from commit 51aa68e7d57e3217192d88ce90fd5b8ef29ec94f)
> Signed-off-by: Stefan Bader <stefan.bader at canonical.com>
> ---
> arch/x86/kvm/vmx.c | 8 ++++++++
> 1 file changed, 8 insertions(+)
>
> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
> index 45af82c..6f2d4493 100644
> --- a/arch/x86/kvm/vmx.c
> +++ b/arch/x86/kvm/vmx.c
> @@ -7837,6 +7837,14 @@ static void prepare_vmcs02(struct kvm_vcpu *vcpu, struct vmcs12 *vmcs12)
> exec_control &= ~CPU_BASED_VIRTUAL_NMI_PENDING;
> exec_control &= ~CPU_BASED_TPR_SHADOW;
> exec_control |= vmcs12->cpu_based_vm_exec_control;
> +
> + if (!(exec_control & CPU_BASED_TPR_SHADOW)) {
> +#ifdef CONFIG_X86_64
> + exec_control |= CPU_BASED_CR8_LOAD_EXITING |
> + CPU_BASED_CR8_STORE_EXITING;
> +#endif
> + }
> +
> /*
> * Merging of IO and MSR bitmaps not currently supported.
> * Rather, exit every time.
> --
> 2.7.4
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list