diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2009-11-16 23:49:19 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2009-11-16 23:49:19 +0000 |
commit | d748624e351732500a33778be7abb0701dbb818d (patch) | |
tree | e6e34c4e74fcc5e645d12cbb0f3f4e2cd7efc7ca /retired/CVE-2009-3640 | |
parent | 7cc9ab5588dcb4d72c0a0a97c4c3bb5c4660b9ad (diff) |
retire issue
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1608 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2009-3640')
-rw-r--r-- | retired/CVE-2009-3640 | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/retired/CVE-2009-3640 b/retired/CVE-2009-3640 new file mode 100644 index 00000000..8aa9debd --- /dev/null +++ b/retired/CVE-2009-3640 @@ -0,0 +1,17 @@ +Candidate: CVE-2009-3640 +Description: + kvm update_cr8_intercept() null ptr dereference +References: + http://www.openwall.com/lists/oss-security/2009/10/24/1 + http://git.kernel.org/linus/88c808fd42b53a7e01a2ac3253ef31fef74cb5af +Notes: + kvm support introduced in 2.6.25 + jmm> The 2.6.26 has the code in a different file, in which is was still + jmm> guarded for APIC. I've send Avi an email and he confirmed that + jmm> older kernels are not affected +Bugs: +upstream: released (2.6.32-rc1) [88c808fd42b53a7e01a2ac3253ef31fef74cb5af], released (2.6.31.2) [c3443b436a0767cbc0d4ab405f8fa13fb34bd56c] +linux-2.6: released (2.6.31-1) +2.6.18-etch-security: N/A "no kvm" +2.6.24-etch-security: N/A "no kvm" +2.6.26-lenny-security: N/A |