Unverified Commit 089561eb authored by openeuler-ci-bot's avatar openeuler-ci-bot Committed by Gitee
Browse files

!2701 [sync] PR-2672: fix CVE-2023-46813

Merge Pull Request from: @openeuler-sync-bot 
 

Origin pull request: 
https://gitee.com/openeuler/kernel/pulls/2672 
 
PR sync from: Yu Liao <liaoyu15@huawei.com>
https://mailweb.openeuler.org/hyperkitty/list/kernel@openeuler.org/message/F5FX4DBY4FGNLQCQ7MNCTCRSKBXESFJA/ 
fix CVE-2023-46813

An issue was discovered in the Linux kernel before 6.5.9, exploitable by local
users with userspace access to MMIO registers. Incorrect access checking in the
#VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses
could lead to arbitrary write access to kernel memory (and thus privilege
escalation). This depends on a race condition through which userspace can
replace an instruction before the #VC handler reads it.

Borislav Petkov (AMD) (1):

Joerg Roedel (2):
  [Backport] x86/sev: Check IOBM for IOIO exceptions from user-space
  [Backport] x86/sev: Check for user-space IOIO pointing to kernel space


-- 
2.25.1
 
https://gitee.com/src-openeuler/kernel/issues/I8BCTB 
 
Link:https://gitee.com/openeuler/kernel/pulls/2701

 

Reviewed-by: default avatarWei Li <liwei391@huawei.com>
Signed-off-by: default avatarJialin Zhang <zhangjialin11@huawei.com>
parents 3cf84590 8b96244b
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please to comment