summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorEric Northup <digitaleric@google.com>2015-11-03 20:03:53 +0300
committerBen Hutchings <ben@decadent.org.uk>2015-11-17 18:54:46 +0300
commit3553e5d34d72a3aac5d967ec8b4d45a88340d679 (patch)
treebd8006da580b44cd8e0f57ea616143569fee0aed /security
parente94e60d82b9fd6c592bfe7b939a991bfe98179ae (diff)
downloadlinux-3553e5d34d72a3aac5d967ec8b4d45a88340d679.tar.xz
KVM: x86: work around infinite loop in microcode when #AC is delivered
commit 54a20552e1eae07aa240fa370a0293e006b5faed upstream. It was found that a guest can DoS a host by triggering an infinite stream of "alignment check" (#AC) exceptions. This causes the microcode to enter an infinite loop where the core never receives another interrupt. The host kernel panics pretty quickly due to the effects (CVE-2015-5307). Signed-off-by: Eric Northup <digitaleric@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> [bwh: Backported to 3.2: - Add definition of AC_VECTOR - Adjust filename, context] Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions