lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230422125317.2222959-1-pbonzini@redhat.com>
Date:   Sat, 22 Apr 2023 08:53:17 -0400
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: [GIT PULL] Final KVM fixes for Linux 6.3

Linus,

The following changes since commit 0bf9601f8ef0703523018e975d6c1f3fdfcff4b9:

  Merge tag 'kvmarm-fixes-6.3-3' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD (2023-04-06 13:34:19 -0400)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/virt/kvm/kvm.git tags/for-linus

for you to fetch changes up to 265b97cbc22e0f67f79a71443b60dc1237ca5ee6:

  Merge tag 'kvmarm-fixes-6.3-4' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD (2023-04-21 19:19:02 -0400)

(I checked and indeed last week's mishap was due to an incorrect push
_after_ I had generated the message and before I sent it.  I always
use "git request-pull", or more precisely a wrapper that generates the
mail headers and the "Linus," at the top, since I am clearly clumsy
enough with the automation that it provides...).

----------------------------------------------------------------
Two serious ARM fixes:

* Plug a buffer overflow due to the use of the user-provided register
  width for firmware regs. Outright reject accesses where the
  user register width does not match the kernel representation.

* Protect non-atomic RMW operations on vCPU flags against preemption,
  as an update to the flags by an intervening preemption could be lost.

----------------------------------------------------------------
Dan Carpenter (1):
      KVM: arm64: Fix buffer overflow in kvm_arm_set_fw_reg()

Marc Zyngier (1):
      KVM: arm64: Make vcpu flag updates non-preemptible

Paolo Bonzini (1):
      Merge tag 'kvmarm-fixes-6.3-4' of git://git.kernel.org/pub/scm/linux/kernel/git/kvmarm/kvmarm into HEAD

 arch/arm64/include/asm/kvm_host.h | 19 ++++++++++++++++++-
 arch/arm64/kvm/hypercalls.c       |  2 ++
 2 files changed, 20 insertions(+), 1 deletion(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ