diff options
author | Eric Northup <digitaleric@google.com> | 2015-11-03 20:03:53 +0300 |
---|---|---|
committer | Ben Hutchings <ben@decadent.org.uk> | 2015-11-17 18:54:46 +0300 |
commit | 3553e5d34d72a3aac5d967ec8b4d45a88340d679 (patch) | |
tree | bd8006da580b44cd8e0f57ea616143569fee0aed /security | |
parent | e94e60d82b9fd6c592bfe7b939a991bfe98179ae (diff) | |
download | linux-3553e5d34d72a3aac5d967ec8b4d45a88340d679.tar.xz |
KVM: x86: work around infinite loop in microcode when #AC is delivered
commit 54a20552e1eae07aa240fa370a0293e006b5faed upstream.
It was found that a guest can DoS a host by triggering an infinite
stream of "alignment check" (#AC) exceptions. This causes the
microcode to enter an infinite loop where the core never receives
another interrupt. The host kernel panics pretty quickly due to the
effects (CVE-2015-5307).
Signed-off-by: Eric Northup <digitaleric@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
[bwh: Backported to 3.2:
- Add definition of AC_VECTOR
- Adjust filename, context]
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions