0014-KVM-x86-work-around-leak-of-uninitialized-stack-cont.patch 1.8 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
  1. From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
  2. From: Paolo Bonzini <[email protected]>
  3. Date: Mon, 25 Feb 2019 11:48:07 +0000
  4. Subject: [PATCH] KVM: x86: work around leak of uninitialized stack contents
  5. (CVE-2019-7222)
  6. Bugzilla: 1671930
  7. Emulation of certain instructions (VMXON, VMCLEAR, VMPTRLD, VMWRITE with
  8. memory operand, INVEPT, INVVPID) can incorrectly inject a page fault
  9. when passed an operand that points to an MMIO address. The page fault
  10. will use uninitialized kernel stack memory as the CR2 and error code.
  11. The right behavior would be to abort the VM with a KVM_EXIT_INTERNAL_ERROR
  12. exit to userspace; however, it is not an easy fix, so for now just
  13. ensure that the error code and CR2 are zero.
  14. Embargoed until Feb 7th 2019.
  15. Reported-by: Felix Wilhelm <[email protected]>
  16. Cc: [email protected]
  17. Signed-off-by: Paolo Bonzini <[email protected]>
  18. CVE-2019-7222
  19. (cherry picked from commit 353c0956a618a07ba4bbe7ad00ff29fe70e8412a)
  20. Signed-off-by: Tyler Hicks <[email protected]>
  21. Signed-off-by: Thomas Lamprecht <[email protected]>
  22. ---
  23. arch/x86/kvm/x86.c | 7 +++++++
  24. 1 file changed, 7 insertions(+)
  25. diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
  26. index b3df576413cd..13804929adce 100644
  27. --- a/arch/x86/kvm/x86.c
  28. +++ b/arch/x86/kvm/x86.c
  29. @@ -4632,6 +4632,13 @@ int kvm_read_guest_virt(struct kvm_vcpu *vcpu,
  30. {
  31. u32 access = (kvm_x86_ops->get_cpl(vcpu) == 3) ? PFERR_USER_MASK : 0;
  32. + /*
  33. + * FIXME: this should call handle_emulation_failure if X86EMUL_IO_NEEDED
  34. + * is returned, but our callers are not ready for that and they blindly
  35. + * call kvm_inject_page_fault. Ensure that they at least do not leak
  36. + * uninitialized kernel stack memory into cr2 and error code.
  37. + */
  38. + memset(exception, 0, sizeof(*exception));
  39. return kvm_read_guest_virt_helper(addr, val, bytes, vcpu, access,
  40. exception);
  41. }