ACK: [SRU][F/J][PATCH 0/1] CVE-2023-52639

ivanhu ivan.hu at canonical.com
Wed Oct 2 06:01:36 UTC 2024


Acked-by: Ivan Hu <ivan.hu at canonical.com>

On 10/2/24 06:01, Ian Whitfield wrote:
> [Impact]
> 
> Right now it is possible to see gmap->private being zero in
> kvm_s390_vsie_gmap_notifier resulting in a crash.  This is due to the
> fact that we add gmap->private == kvm after creation:
> 
> static int acquire_gmap_shadow(struct kvm_vcpu *vcpu,
>                                 struct vsie_page *vsie_page)
> {
> [...]
>          gmap = gmap_shadow(vcpu->arch.gmap, asce, edat);
>          if (IS_ERR(gmap))
>                  return PTR_ERR(gmap);
>          gmap->private = vcpu->kvm;
> 
> Let children inherit the private field of the parent.
> 
> [Backport]
> 
> The patch required an update to its context.
> 
> [Fix]
> 
> Noble:  not affected
> Jammy:  backport
> Focal:  backport
> Bionic: fix sent to esm mailing list
> Xenial: not affected
> Trusty: not affected
> 
> [Test Case]
> 
> Compile and boot tested
> 
> [Where problems could occur]
> 
> This fix affects those who use KVM virtualization on s390x processors.
> An issue with this fix would be visible to user via a system crash.
> 
> 
> Christian Borntraeger (1):
>    KVM: s390: vsie: fix race during shadow creation
> 
>   arch/s390/kvm/vsie.c | 1 -
>   arch/s390/mm/gmap.c  | 1 +
>   2 files changed, 1 insertion(+), 1 deletion(-)
> 



More information about the kernel-team mailing list