39134eb9d2
on invalid state load CVE-2013-4539-qemut-tsc210x-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962632 - VUL-0: CVE-2015-1779: xen: vnc: insufficient resource limiting in VNC websockets decoder CVE-2015-1779-qemuu-limit-size-of-HTTP-headers-from-websockets-clients.patch CVE-2015-1779-qemuu-incrementally-decode-websocket-frames.patch - bsc#962642 - VUL-0: CVE-2013-4537: xen: ssi-sd: buffer overrun on invalid state load CVE-2013-4537-qemut-ssi-sd-fix-buffer-overrun-on-invalid-state-load.patch - bsc#962627 - VUL-0: CVE-2014-7815: xen: vnc: insufficient bits_per_pixel from the client sanitization CVE-2014-7815-qemut-vnc-sanitize-bits_per_pixel-from-the-client.patch - bsc#962335 - VUL-0: CVE-2013-4538: xen: ssd0323: fix buffer overun on invalid state CVE-2013-4538-qemut-ssd0323-fix-buffer-overun-on-invalid-state.patch - bsc#962360 - VUL-0: CVE-2015-7512: xen: net: pcnet: buffer overflow in non-loopback mode CVE-2015-7512-qemuu-net-pcnet-buffer-overflow-in-non-loopback-mode.patch CVE-2015-7512-qemut-net-pcnet-buffer-overflow-in-non-loopback-mode.patch - bsc#961692 - VUL-0: CVE-2016-1714: xen: nvram: OOB r/w access in processing firmware configurations CVE-2016-1714-qemuu-fw_cfg-add-check-to-validate-current-entry-value.patch CVE-2016-1714-qemut-fw_cfg-add-check-to-validate-current-entry-value.patch - bsc#961358 - VUL-0: CVE-2015-8613: xen: qemu: scsi: stack based buffer overflow in megasas_ctrl_get_info OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=395
30 lines
1.1 KiB
Diff
30 lines
1.1 KiB
Diff
x86/VMX: prevent INVVPID failure due to non-canonical guest address
|
|
|
|
While INVLPG (and on SVM INVLPGA) don't fault on non-canonical
|
|
addresses, INVVPID fails (in the "individual address" case) when passed
|
|
such an address.
|
|
|
|
Since such intercepted INVLPG are effectively no-ops anyway, don't fix
|
|
this in vmx_invlpg_intercept(), but instead have paging_invlpg() never
|
|
return true in such a case.
|
|
|
|
This is XSA-168.
|
|
|
|
Signed-off-by: Jan Beulich <jbeulich@suse.com>
|
|
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
|
|
Acked-by: Ian Campbell <ian.campbell@citrix.com>
|
|
|
|
Index: xen-4.6.0-testing/xen/include/asm-x86/paging.h
|
|
===================================================================
|
|
--- xen-4.6.0-testing.orig/xen/include/asm-x86/paging.h
|
|
+++ xen-4.6.0-testing/xen/include/asm-x86/paging.h
|
|
@@ -245,7 +245,7 @@ paging_fault(unsigned long va, struct cp
|
|
* or 0 if it's safe not to do so. */
|
|
static inline int paging_invlpg(struct vcpu *v, unsigned long va)
|
|
{
|
|
- return paging_get_hostmode(v)->invlpg(v, va);
|
|
+ return is_canonical_address(va) && paging_get_hostmode(v)->invlpg(v, va);
|
|
}
|
|
|
|
/* Translate a guest virtual address to the frame number that the
|