From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754109AbbCKOgL (ORCPT ); Wed, 11 Mar 2015 10:36:11 -0400 Received: from smtp02.citrix.com ([66.165.176.63]:18016 "EHLO SMTP02.CITRIX.COM" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751821AbbCKOgH (ORCPT ); Wed, 11 Mar 2015 10:36:07 -0400 X-IronPort-AV: E=Sophos;i="5.11,382,1422921600"; d="scan'208";a="243995918" Message-ID: <550052D4.8070208@citrix.com> Date: Wed, 11 Mar 2015 14:36:04 +0000 From: David Vrabel User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.4.0 MIME-Version: 1.0 To: Jan Beulich , David Vrabel , Boris Ostrovsky , Konrad Rzeszutek Wilk CC: xen-devel , Subject: Re: [Xen-devel] [PATCH 1/2] xen-pciback: limit guest control of command register References: <5500566502000078000688D7@mail.emea.novell.com> In-Reply-To: <5500566502000078000688D7@mail.emea.novell.com> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-DLP: MIA1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/03/15 13:51, Jan Beulich wrote: > Otherwise the guest can abuse that control to cause e.g. PCIe > Unsupported Request responses (by disabling memory and/or I/O decoding > and subsequently causing [CPU side] accesses to the respective address > ranges), which (depending on system configuration) may be fatal to the > host. > > Note that to alter any of the bits collected together as > PCI_COMMAND_GUEST permissive mode is now required to be enabled > globally or on the specific device. > > This is CVE-2015-2150 / XSA-120. Applied to stable/for-linus-4.0 and tagged for stable, thanks. David