x86/sev: Check for user-space IOIO pointing to kernel space
stable inclusion from stable-v5.10.199 commit 6550cbe25de182f6c0176909a90b324cb375133f category: bugfix bugzilla: https://gitee.com/src-openeuler/kernel/issues/I8BCTB CVE: CVE-2023-46813 Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=6550cbe25de182f6c0176909a90b324cb375133f -------------------------------- Upstream commit: 63e44bc5 Check the memory operand of INS/OUTS before emulating the instruction. The #VC exception can get raised from user-space, but the memory operand can be manipulated to access kernel memory before the emulation actually begins and after the exception handler has run. [ bp: Massage commit message. ] Fixes: 597cfe48 ("x86/boot/compressed/64: Setup a GHCB-based VC Exception handler") Reported-by:Tom Dohrmann <erbse.13@gmx.de> Signed-off-by:
Joerg Roedel <jroedel@suse.de> Signed-off-by:
Borislav Petkov (AMD) <bp@alien8.de> Cc: <stable@kernel.org> Signed-off-by:
Greg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by:
Yu Liao <liaoyu15@huawei.com> (cherry picked from commit 658245d6)
Loading
Please sign in to comment