Date: Mon, 24 Feb 2020 14:41:35 -0500 From: Boris Ostrovsky <boris.ostrovsky@...cle.com> To: oss-security@...ts.openwall.com Subject: CVE-2020-2732: Nested VMX vulnerability Under certain circumstances, an L2 guest may trick the L0 hypervisor into accessing sensitive L1 resources that are supposed to be inaccessible to the L2 guest according to L1 hypervisor configuration. Only Intel processors are affected. Patches are attached. From cover letter: vmx_check_intercept is not yet fully implemented by KVM on Intel processors, causing e.g. the I/O or MSR interception bitmaps not to be checked. In general we can just disallow instruction emulation on behalf of L1, but this series also implements I/O port checks. Thanks. -boris Download attachment "CVE-2020-2732.tgz" of type "application/x-compressed-tar" (2744 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.