lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2c24aca9-5e67-4c0f-b890-92a0ad8e1975@citrix.com>
Date: Thu, 19 Jun 2025 12:31:22 +0100
From: Andrew Cooper <andrew.cooper3@...rix.com>
To: Marek Marczykowski-Górecki
 <marmarek@...isiblethingslab.com>, Dave Hansen
 <dave.hansen@...ux.intel.com>, Andy Lutomirski <luto@...nel.org>,
 Peter Zijlstra <peterz@...radead.org>
Cc: xen-devel <xen-devel@...ts.xenproject.org>, linux-kernel@...r.kernel.org
Subject: Re: Xen PV dom0 "tried to execute NX-protected page" when running
 nested in KVM - 6.15 regression

On 19/06/2025 12:24 pm, Marek Marczykowski-Górecki wrote:
> Hi,
>
> With Linux 6.15.2 I got a crash like below. It worked fine with Linux
> 6.14.11. Furthermore, the failure seems to be hardware-dependent. It
> happens when running on Intel Core i9-13900H, but does not happen when
> running on Intel Xeon E5-2620v4 (in both cases QEMU uses -cpu host).

Yes, it's a known regression in Linux's ITS / CVE-2024-28956 patches.

https://lore.kernel.org/lkml/20250603111446.2609381-1-rppt@kernel.org/

It's hardware-dependent because so is Indirect Target Selection.

~Andrew

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ