]> xenbits.xensource.com Git - qemu-upstream-4.5-testing.git/commit
xen: limit guest control of PCI command register qemu-xen-4.5.1-rc1
authorJan Beulich <jbeulich@suse.com>
Tue, 31 Mar 2015 13:58:04 +0000 (13:58 +0000)
committerStefano Stabellini <stefano.stabellini@eu.citrix.com>
Tue, 31 Mar 2015 14:04:25 +0000 (14:04 +0000)
commitc9ac5f816bf3a8b56f836b078711dcef6e5c90b8
tree8bc6897815ce17e0f1195a65cfa22f5fe5259dd3
parent0b8fb1ec3d666d1eb8bbff56c76c5e6daa2789e4
xen: limit guest control of PCI command register

Otherwise the guest can abuse that control to cause e.g. PCIe
Unsupported Request responses (by disabling memory and/or I/O decoding
and subsequently causing [CPU side] accesses to the respective address
ranges), which (depending on system configuration) may be fatal to the
host.

This is CVE-2015-2756 / XSA-126.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
hw/xen/xen_pt.c
hw/xen/xen_pt_config_init.c