[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-4.2-testing] x86_32: don't allow use of nested HVM
# HG changeset patch # User Jan Beulich <jbeulich@xxxxxxxx> # Date 1358938276 -3600 # Node ID fef7ef92f08e46d6f7b04551394d17a835dbe110 # Parent 99376b5882f71877acf74dec9fdd25d5f9d83bbb x86_32: don't allow use of nested HVM There are (indirect) uses of map_domain_page() in the nested HVM code that are unsafe when not just using the 1:1 mapping. This is XSA-34 / CVE-2013-0151. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> --- diff -r 99376b5882f7 -r fef7ef92f08e xen/arch/x86/hvm/hvm.c --- a/xen/arch/x86/hvm/hvm.c Thu Jan 17 16:00:49 2013 +0000 +++ b/xen/arch/x86/hvm/hvm.c Wed Jan 23 11:51:16 2013 +0100 @@ -3862,6 +3862,10 @@ long do_hvm_op(unsigned long op, XEN_GUE rc = -EINVAL; break; case HVM_PARAM_NESTEDHVM: +#ifdef __i386__ + if ( a.value ) + rc = -EINVAL; +#else if ( a.value > 1 ) rc = -EINVAL; if ( !is_hvm_domain(d) ) @@ -3876,6 +3880,7 @@ long do_hvm_op(unsigned long op, XEN_GUE for_each_vcpu(d, v) if ( rc == 0 ) rc = nestedhvm_vcpu_initialise(v); +#endif break; case HVM_PARAM_BUFIOREQ_EVTCHN: rc = -EINVAL; _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |