Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20231114192402.GA12417@openwall.com>
Date: Tue, 14 Nov 2023 20:24:02 +0100
From: Solar Designer <solar@...nwall.com>
To: oss-security@...ts.openwall.com
Cc: Antonio Gomez Iglesias <antonio.gomez.iglesias@...el.com>,
	Tavis Ormandy <taviso@...il.com>
Subject: Re: CVE-2023-23583: Intel - Denial of Service - Privilege Escalation (Reptar)

On Tue, Nov 14, 2023 at 01:58:21PM -0500, Demi Marie Obenour wrote:
> Does this also allow privilege escalation from a VM guest to the host?

Per Tavis' writeup, this at least allows a VM guest to trigger machine
check exceptions and halt the host.  So it's at least a DoS.  My reading
is this can cause wrong control flow at least in SMT sibling threads, so
is a privilege escalation risk from VMs at least when SMT is enabled.
Without SMT, it's still at least a DoS.

> What are the limited scenarios?

I would like to know this, too.  I doubt it's been fully researched.

Alexander

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.