diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2016-02-17 12:26:02 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2016-02-17 12:26:02 +0000 |
commit | c0372613a159c2981e0845fc26bcb0777b58a778 (patch) | |
tree | 8ff0b2d90a41a5ee22456e34e14db794516fe9f3 /retired/CVE-2015-5307 | |
parent | c3e852fb5024312597a7e6225b7f2ef85b125a71 (diff) |
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4170 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2015-5307')
-rw-r--r-- | retired/CVE-2015-5307 | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/retired/CVE-2015-5307 b/retired/CVE-2015-5307 new file mode 100644 index 00000000..ea03ec0f --- /dev/null +++ b/retired/CVE-2015-5307 @@ -0,0 +1,12 @@ +Description: Denial of service by KVM guest using #AC exception +References: +Notes: +Bugs: +upstream: released (4.4-rc1) [54a20552e1eae07aa240fa370a0293e006b5faed] +3.16-upstream-stable: released (v3.16.7-ckt21) [033edc3a7d4c3fd1560aa41e051d6e79b9545ed0] +3.2-upstream-stable: released (3.2.73) [kvm-x86-work-around-infinite-loop-in-microcode-when-ac-is.patch] +2.6.32-upstream-stable: ignored "end of life" +sid: released (4.2.6-1) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch] +3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch] +3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch] +2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS" |