summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2015-0239
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2015-05-19 08:20:58 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2015-05-19 08:20:58 +0000
commitd5eb1c8440bdde6cc8e176a2b150ab6106730415 (patch)
tree8aa30ca454e22ebe0531b48949f6da7dc9257a33 /retired/CVE-2015-0239
parentebe89920dd296773de65e46d9e9e8551796f9e62 (diff)
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3790 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2015-0239')
-rw-r--r--retired/CVE-2015-023917
1 files changed, 17 insertions, 0 deletions
diff --git a/retired/CVE-2015-0239 b/retired/CVE-2015-0239
new file mode 100644
index 00000000..6a3f692c
--- /dev/null
+++ b/retired/CVE-2015-0239
@@ -0,0 +1,17 @@
+Description: KVM: x86: SYSENTER emulation is broken
+References: https://git.kernel.org/linus/f3747379accba8e95d70cec0eae0582c8c182050
+Notes:
+ bwh> This revealed another earlier fix, commit 1a18a69b7623 ("KVM: x86
+ bwh> emulator: reject SYSENTER in compatibility mode on AMD guests").
+ bwh> It wasn't marked for stable but the bug might be exploitable by
+ bwh> guest userland to crash the guest system. I've queued it up for
+ bwh> wheezy-security along with this.
+Bugs:
+upstream: released (3.19-rc6) [f3747379accba8e95d70cec0eae0582c8c182050]
+2.6.32-upstream-stable: ignored
+sid: released (3.16.7-ckt4-2) [bugfix/x86/kvm-x86-sysenter-emulation-is-broken.patch]
+3.16-jessie-security: N/A "Fixed before initial release"
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/x86/kvm-x86-sysenter-emulation-is-broken.patch]
+2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
+3.16-upstream-stable: released (3.16.7-ckt6)
+3.2-upstream-stable: released (3.2.67) [kvm-x86-sysenter-emulation-is-broken.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy