]> git.karo-electronics.de Git - karo-tx-linux.git/commit
KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798)
authorAndy Honig <ahonig@google.com>
Wed, 20 Feb 2013 22:49:16 +0000 (14:49 -0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Thu, 25 Apr 2013 19:51:10 +0000 (12:51 -0700)
commit24a5d26686ee4bb22fcf5d3c8b9d9227cbc0c187
treec5d72d023373aff4923cd77529e033f54d6fc553
parent17b61c3d1ca2a739c44e0c24565ce97a2086156f
KVM: Fix bounds checking in ioapic indirect register reads (CVE-2013-1798)

commit a2c118bfab8bc6b8bb213abfc35201e441693d55 upstream.

If the guest specifies a IOAPIC_REG_SELECT with an invalid value and follows
that with a read of the IOAPIC_REG_WINDOW KVM does not properly validate
that request.  ioapic_read_indirect contains an
ASSERT(redir_index < IOAPIC_NUM_PINS), but the ASSERT has no effect in
non-debug builds.  In recent kernels this allows a guest to cause a kernel
oops by reading invalid memory.  In older kernels (pre-3.3) this allows a
guest to read from large ranges of host memory.

Tested: tested against apic unit tests.

Signed-off-by: Andrew Honig <ahonig@google.com>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Ben Hutchings <ben@decadent.org.uk>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
virt/kvm/ioapic.c