[SRU][F/J][PATCH 0/1] CVE-2023-52639

Ian Whitfield ian.whitfield at canonical.com
Tue Oct 1 22:01:19 UTC 2024


[Impact]

Right now it is possible to see gmap->private being zero in
kvm_s390_vsie_gmap_notifier resulting in a crash.  This is due to the
fact that we add gmap->private == kvm after creation:

static int acquire_gmap_shadow(struct kvm_vcpu *vcpu,
                               struct vsie_page *vsie_page)
{
[...]
        gmap = gmap_shadow(vcpu->arch.gmap, asce, edat);
        if (IS_ERR(gmap))
                return PTR_ERR(gmap);
        gmap->private = vcpu->kvm;

Let children inherit the private field of the parent.

[Backport]

The patch required an update to its context.

[Fix]

Noble:  not affected
Jammy:  backport
Focal:  backport
Bionic: fix sent to esm mailing list
Xenial: not affected
Trusty: not affected

[Test Case]

Compile and boot tested

[Where problems could occur]

This fix affects those who use KVM virtualization on s390x processors.
An issue with this fix would be visible to user via a system crash.


Christian Borntraeger (1):
  KVM: s390: vsie: fix race during shadow creation

 arch/s390/kvm/vsie.c | 1 -
 arch/s390/mm/gmap.c  | 1 +
 2 files changed, 1 insertion(+), 1 deletion(-)

-- 
2.43.0




More information about the kernel-team mailing list