back to article Hypervisor headaches: Hosts hosed by x86 exception bugs

Various hypervisors and operating systems are scrambling to patch around an x86 bug that lets an admin-level guest crash the underlying CPU, causing a denial-of-service to anyone else on the same machine. The issue, described here, is that with some x86 CPUs, an attacker with kernel-mode code execution privileges on a guest …

  1. Anonymous Coward
    Anonymous Coward

    Bugs like this are why C is bad!!!11!!*

    *fully aware this is a hardware bug.

    1. Anonymous Coward
      Anonymous Coward

      I respectfully disagree. It's about the processor not behaving as specified: as such the issue would be triggered regardless of implementation language.

      1. Anonymous Coward
        Anonymous Coward

        I thought someone would reply like that hence I mentioned I'm fully aware that it's not a software issue.

        Thumbs down for missing the obvious joke.

  2. asphytxtc

    I'd be interested to know if this affects any other hypervisors? We run a lot of VMWare here...

    1. Anonymous Coward
      Anonymous Coward

      It affects every hypervisor. It's a bug in the CPU. The patches Xen etc are pushing out is a software workaround. If you read their notes on the xen patch they basically say "this should be fixed in the cpu but that's a bit unreasonable because the cpu is hardware* so we are putting a software workaround in place"

      *maybe the issue can be fixed in a microcode update?

    2. Anonymous Coward
      Anonymous Coward

      "Thumbs down for missing the obvious joke."

      LOL: The obvious joke, was obviously not obvious enough

    3. Lynrd

      "kvm or Xen on other Linux variants"

      It sounds like VMWare would be affected too...as a Linux variant...

      1. Anonymous Coward
        Anonymous Coward

        Re: "kvm or Xen on other Linux variants"

        VMware ESX is not a Linux variant. Go google Disco, SimOS and Mendel Rosenbaum.

      2. Anonymous Coward
        Anonymous Coward

        Re: "kvm or Xen on other Linux variants"

        This does not affect the VMware hypervisor, but check with their support to be sure.

  3. Ptol

    I'd expect more of The Register...

    So there is a bug in some CPU's virtualisation support. The Register runs a story on it. Great...

    But we get very little real info, just hype. Is it just x86? and not x64? in which case this is a non-story, as any significant user of virtualisation will be doing it on 64 bit servers. The issue 'described here' link actually takes you to the Microsoft patch, which is not exactly informative of the problem.

    Please reflect on how a more suitable article could have been written.

    1. Ken Hagan Gold badge

      Re: I'd expect more of The Register...

      In fairness, the two CVEs are both content-free and MS have not publicly disclosed the bugs yet. The Xen bug report suggests that the problems lie with the delivery of exceptions to 32-bit guests and so perhaps the host bitness wouldn't matter. The MS report states that the problem is with the chipset, not the CPU, but is otherwise (as you note) not exactly informative.

      A "more suitable article" probably can't be written right now unless you are willing to reverse engineer the patches.

      1. Solmyr ibn Wali Barad

        Re: I'd expect more of The Register...

        "Xen bug report suggests that the problems lie with the delivery of exceptions to 32-bit guests"

        Plausible, and it wouldn't be the first such bug.

        Search for Intel errata AAK167 and BT248 from 2013.

        Can I remind of F00F bug from nineties, too? No? OK then. Coat, please.

      2. jonathanb Silver badge

        Re: I'd expect more of The Register...

        So if I run only x64 guests, do I need to worry about this?

        1. Jim Mattson

          Re: I'd expect more of The Register...

          You only need to worry about this if you run a malicious guest, or a guest that has been compromised by malware with supervisory level access. In either case, it is possible for the rogue code to set up the necessary environment to exploit these design flaws.

  4. Jim Mattson

    VMware is not affected

    VMware implemented the necessary workarounds for these issues in 2005. No current VMware product is affected.

    1. Solmyr ibn Wali Barad

      Re: VMware is not affected

      Hard to say, until there's more info on it.

      2013 batch (AAK167/BD132/BT248) definitely made ESX turn purple at face.

      Can't remember if VMware ever tried to apply CPU microcode patches via kernel updates. Anyhow, in 2013 IT folks ran around like Duracell bunnies, doing BIOS updates for every ESX and Hyper-V server out there.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like