-
Notifications
You must be signed in to change notification settings - Fork 12
[LTS 8.6] x86/sev: Harden #VC instruction emulation somewhat #505
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
jira VULN-751 cve CVE-2024-25742 commit-author Borislav Petkov (AMD) <[email protected]> commit e3ef461 upstream-diff Conflicts are just a matter of placing the code correctly in this older version of the driver, no compatibility issues. Compare the opcode bytes at rIP for each #VC exit reason to verify the instruction which raised the #VC exception is actually the right one. Signed-off-by: Borislav Petkov (AMD) <[email protected]> Acked-by: Tom Lendacky <[email protected]> Link: https://lore.kernel.org/r/[email protected] (cherry picked from commit e3ef461) Signed-off-by: Sultan Alsawaf <[email protected]> # Conflicts: # arch/x86/kernel/sev-shared.c
🔍 Upstream Linux Kernel Commit Check
This is an automated message from the kernel commit checker workflow. |
jira VULN-751 cve-bf CVE-2024-25742 commit-author Tom Lendacky <[email protected]> commit e70316d The MWAITX and MONITORX instructions generate the same #VC error code as the MWAIT and MONITOR instructions, respectively. Update the #VC handler opcode checking to also support the MWAITX and MONITORX opcodes. Fixes: e3ef461 ("x86/sev: Harden #VC instruction emulation somewhat") Signed-off-by: Tom Lendacky <[email protected]> Signed-off-by: Borislav Petkov (AMD) <[email protected]> Link: https://lore.kernel.org/r/453d5a7cfb4b9fe818b6fb67f93ae25468bc9e23.1713793161.git.thomas.lendacky@amd.com (cherry picked from commit e70316d) Signed-off-by: Jonathan Maple <[email protected]>
This is a clean pick and not associated to another CVE from searching here https://git.kernel.org/pub/scm/linux/security/vulns.git/ Rebuilding and running tests again. |
🔍 Upstream Linux Kernel Commit Check
This is an automated message from the kernel commit checker workflow. |
We'll have to make this smarter so that it doesn't report the upstream fix if we already have it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🥌
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚤
jira LE-3834
cve CVE-2024-25742
BUILD LOG
Kself Test