APPLIED: [SRU][F/I/J][PATCH 0/1] CVE-2022-1789
Stefan Bader
stefan.bader at canonical.com
Tue Jun 21 15:23:36 UTC 2022
On 02.06.22 17:05, Cengiz Can wrote:
> [Impact]
>
> From https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789
>
> With shadow paging enabled, the INVPCID instruction results in a call
> to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the
> invlpg callback is not set and the result is a NULL pointer dereference.
>
> [Other Info]
>
> * mmu->root_hpa was moved to mmu->root.hpa in 5.18-rc1
> (commit b9e5603c2a3accbadfec570ac501a54431a6bdba) and the fix was done
> according to that change. While backporting, we had to modify the patch
> to use mmu->root_hpa. This might cause merge conflicts in the future.
>
> * Target file resides in arch/x86/kvm instead of arch/x86/kvm/mmu in
> older kernels.
>
> Paolo Bonzini (1):
> KVM: x86/mmu: fix NULL pointer dereference on guest INVPCID
>
> arch/x86/kvm/mmu/mmu.c | 6 ++++--
> 1 file changed, 4 insertions(+), 2 deletions(-)
>
Applied to jammy,impish,focal:linux/master-next. Thanks.
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20220621/c843dda3/attachment.sig>
More information about the kernel-team
mailing list