original_kernel/virt/kvm
Andy Honig a2c118bfab KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798)
If the guest specifies a IOAPIC_REG_SELECT with an invalid value and follows
that with a read of the IOAPIC_REG_WINDOW KVM does not properly validate
that request.  ioapic_read_indirect contains an
ASSERT(redir_index < IOAPIC_NUM_PINS), but the ASSERT has no effect in
non-debug builds.  In recent kernels this allows a guest to cause a kernel
oops by reading invalid memory.  In older kernels (pre-3.3) this allows a
guest to read from large ranges of host memory.

Tested: tested against apic unit tests.

Signed-off-by: Andrew Honig <ahonig@google.com>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2013-03-19 14:20:21 -03:00
..
Kconfig
assigned-dev.c
async_pf.c
async_pf.h
coalesced_mmio.c
coalesced_mmio.h
eventfd.c hlist: drop the node parameter from iterators 2013-02-27 19:10:24 -08:00
ioapic.c KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798) 2013-03-19 14:20:21 -03:00
ioapic.h x86, apicv: add virtual interrupt delivery support 2013-01-29 10:48:19 +02:00
iodev.h
iommu.c kvm: Obey read-only mappings in iommu 2013-01-27 12:41:41 +02:00
irq_comm.c hlist: drop the node parameter from iterators 2013-02-27 19:10:24 -08:00
kvm_main.c KVM: Remove user_alloc from struct kvm_memory_slot 2013-02-11 11:52:00 +02:00