Re: Nullptr dereference in nested VMX when shadow VMCS support is available

2025-06-02 Thread Manuel Andreas
On 6/2/25 17:42, Jan Beulich wrote: This is possible when: 1. The malicious domain has nested HVM capabilities. 2. The CPU is running on top of VMX and supports shadow VMCS. To trigger the bug, the domain must first enable VMX operation for itself, execute VMXON and then finally execute

Re: Nullptr dereference in nested VMX when shadow VMCS support is available

2025-06-02 Thread Jan Beulich
On 02.06.2025 16:52, Manuel Andreas wrote: > On 6/2/25 4:12 PM, Jan Beulich wrote: > >> On 02.06.2025 15:39, Manuel Andreas wrote: >>> I've discovered an issue in the nested VMX implementation, where an >>> unprivileged domain is able to force Xen to dereference a NULL pointer, >>> resulting in a

Re: Nullptr dereference in nested VMX when shadow VMCS support is available

2025-06-02 Thread Manuel Andreas
On 6/2/25 4:12 PM, Jan Beulich wrote: On 02.06.2025 15:39, Manuel Andreas wrote: I've discovered an issue in the nested VMX implementation, where an unprivileged domain is able to force Xen to dereference a NULL pointer, resulting in a panic. Sadly you provide no details on this NULL deref. H

Re: Nullptr dereference in nested VMX when shadow VMCS support is available

2025-06-02 Thread Jan Beulich
On 02.06.2025 15:39, Manuel Andreas wrote: > I've discovered an issue in the nested VMX implementation, where an > unprivileged domain is able to force Xen to dereference a NULL pointer, > resulting in a panic. Sadly you provide no details on this NULL deref. > This is possible when: > > 1. T

Nullptr dereference in nested VMX when shadow VMCS support is available

2025-06-02 Thread Manuel Andreas
Dear all, I've discovered an issue in the nested VMX implementation, where an unprivileged domain is able to force Xen to dereference a NULL pointer, resulting in a panic. This is possible when: 1. The malicious domain has nested HVM capabilities. 2. The CPU is running on top of VMX and supp