summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2015-5307
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2016-02-17 12:26:02 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2016-02-17 12:26:02 +0000
commitc0372613a159c2981e0845fc26bcb0777b58a778 (patch)
tree8ff0b2d90a41a5ee22456e34e14db794516fe9f3 /retired/CVE-2015-5307
parentc3e852fb5024312597a7e6225b7f2ef85b125a71 (diff)
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4170 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2015-5307')
-rw-r--r--retired/CVE-2015-530712
1 files changed, 12 insertions, 0 deletions
diff --git a/retired/CVE-2015-5307 b/retired/CVE-2015-5307
new file mode 100644
index 00000000..ea03ec0f
--- /dev/null
+++ b/retired/CVE-2015-5307
@@ -0,0 +1,12 @@
+Description: Denial of service by KVM guest using #AC exception
+References:
+Notes:
+Bugs:
+upstream: released (4.4-rc1) [54a20552e1eae07aa240fa370a0293e006b5faed]
+3.16-upstream-stable: released (v3.16.7-ckt21) [033edc3a7d4c3fd1560aa41e051d6e79b9545ed0]
+3.2-upstream-stable: released (3.2.73) [kvm-x86-work-around-infinite-loop-in-microcode-when-ac-is.patch]
+2.6.32-upstream-stable: ignored "end of life"
+sid: released (4.2.6-1) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"

© 2014-2024 Faster IT GmbH | imprint | privacy policy