Commit 1ba2ed4
x86/sev: Disable MMIO emulation from user mode
jira VULN-6719
cve CVE-2023-46813
commit-author Borislav Petkov (AMD) <bp@alien8.de>
commit a37cd2a
A virt scenario can be constructed where MMIO memory can be user memory.
When that happens, a race condition opens between when the hardware
raises the #VC and when the #VC handler gets to emulate the instruction.
If the MOVS is replaced with a MOVS accessing kernel memory in that
small race window, then write to kernel memory happens as the access
checks are not done at emulation time.
Disable MMIO emulation in user mode temporarily until a sensible use
case appears and justifies properly handling the race window.
Fixes: 0118b60 ("x86/sev-es: Handle MMIO String Instructions")
Reported-by: Tom Dohrmann <erbse.13@gmx.de>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Tested-by: Tom Dohrmann <erbse.13@gmx.de>
Cc: <stable@kernel.org>
(cherry picked from commit a37cd2a)
Signed-off-by: Marcin Wcisło <marcin.wcislo@conclusive.pl>1 parent e8809b4 commit 1ba2ed4
1 file changed
+3
-0
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
1533 | 1533 | | |
1534 | 1534 | | |
1535 | 1535 | | |
| 1536 | + | |
| 1537 | + | |
| 1538 | + | |
1536 | 1539 | | |
1537 | 1540 | | |
1538 | 1541 | | |
| |||
0 commit comments