diff options
| author | Marios Pomonis <[email protected]> | 2019-12-11 12:47:49 -0800 |
|---|---|---|
| committer | Paolo Bonzini <[email protected]> | 2020-01-27 19:59:41 +0100 |
| commit | 6ec4c5eee1750d5d17951c4e1960d953376a0dda (patch) | |
| tree | 96e3a784d8aa180d07520f30368cc3768614ce07 /scripts/gdb/linux/modules.py | |
| parent | 13c5183a4e643cc2b03a22d0e582c8e17bb7457d (diff) | |
KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c
This fixes a Spectre-v1/L1TF vulnerability in set_msr_mce() and
get_msr_mce().
Both functions contain index computations based on the
(attacker-controlled) MSR number.
Fixes: 890ca9aefa78 ("KVM: Add MCE support")
Signed-off-by: Nick Finco <[email protected]>
Signed-off-by: Marios Pomonis <[email protected]>
Reviewed-by: Andrew Honig <[email protected]>
Cc: [email protected]
Reviewed-by: Jim Mattson <[email protected]>
Signed-off-by: Paolo Bonzini <[email protected]>
Diffstat (limited to 'scripts/gdb/linux/modules.py')
0 files changed, 0 insertions, 0 deletions