]> xenbits.xensource.com Git - qemu-xen-4.2-testing.git/commit
xen: limit guest control of PCI command register
authorJan Beulich <jbeulich@suse.com>
Tue, 31 Mar 2015 15:27:45 +0000 (16:27 +0100)
committerIan Jackson <Ian.Jackson@eu.citrix.com>
Tue, 31 Mar 2015 15:34:27 +0000 (16:34 +0100)
commitfb44e83c346436ae8dc07d91dfedb108b8a4e673
tree2784be1bf1d68f5ea397bc87218d8ffc3f729a38
parent8d7e96f625c4a58d721db413b032fd0bb5671b96
xen: limit guest control of PCI command register

Otherwise the guest can abuse that control to cause e.g. PCIe
Unsupported Request responses (by disabling memory and/or I/O decoding
and subsequently causing [CPU side] accesses to the respective address
ranges), which (depending on system configuration) may be fatal to the
host.

This is CVE-2015-2756 / XSA-126.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
(cherry picked from commit ab42b4408cb4fc4f869d73218e3d2034e6f5e8ac)
(cherry picked from commit 62e41581f69c3fd4a8f829a773015eb4c17f1f3e)
(cherry picked from commit a03c5a74e1774aeabcda55ecbfb2887027787755)
(cherry picked from commit edb43a7abbec40fb601140fecdc29d693358963b)
hw/pass-through.c