summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2009-3640
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2009-11-16 23:49:19 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2009-11-16 23:49:19 +0000
commitd748624e351732500a33778be7abb0701dbb818d (patch)
treee6e34c4e74fcc5e645d12cbb0f3f4e2cd7efc7ca /retired/CVE-2009-3640
parent7cc9ab5588dcb4d72c0a0a97c4c3bb5c4660b9ad (diff)
retire issue
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1608 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2009-3640')
-rw-r--r--retired/CVE-2009-364017
1 files changed, 17 insertions, 0 deletions
diff --git a/retired/CVE-2009-3640 b/retired/CVE-2009-3640
new file mode 100644
index 00000000..8aa9debd
--- /dev/null
+++ b/retired/CVE-2009-3640
@@ -0,0 +1,17 @@
+Candidate: CVE-2009-3640
+Description:
+ kvm update_cr8_intercept() null ptr dereference
+References:
+ http://www.openwall.com/lists/oss-security/2009/10/24/1
+ http://git.kernel.org/linus/88c808fd42b53a7e01a2ac3253ef31fef74cb5af
+Notes:
+ kvm support introduced in 2.6.25
+ jmm> The 2.6.26 has the code in a different file, in which is was still
+ jmm> guarded for APIC. I've send Avi an email and he confirmed that
+ jmm> older kernels are not affected
+Bugs:
+upstream: released (2.6.32-rc1) [88c808fd42b53a7e01a2ac3253ef31fef74cb5af], released (2.6.31.2) [c3443b436a0767cbc0d4ab405f8fa13fb34bd56c]
+linux-2.6: released (2.6.31-1)
+2.6.18-etch-security: N/A "no kvm"
+2.6.24-etch-security: N/A "no kvm"
+2.6.26-lenny-security: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy