summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2018-14678
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2018-10-10 16:08:10 +0200
committerMoritz Muehlenhoff <jmm@debian.org>2018-10-10 16:08:10 +0200
commite58840f1b07272348f16568187550f5c219ee2eb (patch)
treeb971c0cfbc0ac9ff0560015a7861cbb6560c73ae /retired/CVE-2018-14678
parent57b924820eb68766ff307bf9efd9f1d318dd0a34 (diff)
retire more issues
Diffstat (limited to 'retired/CVE-2018-14678')
-rw-r--r--retired/CVE-2018-1467818
1 files changed, 18 insertions, 0 deletions
diff --git a/retired/CVE-2018-14678 b/retired/CVE-2018-14678
new file mode 100644
index 00000000..1be10453
--- /dev/null
+++ b/retired/CVE-2018-14678
@@ -0,0 +1,18 @@
+Description: XSA-274: Uninitialized state in PV syscall return path
+References:
+ https://xenbits.xen.org/xsa/advisory-274.html
+Notes:
+ carnil> Fixes 3ac6d8c787b8 ("x86/entry/64: Clear registers for
+ carnil> exceptions/interrupts, to reduce speculation attack surface")
+ carnil> which was cc'ed to stable@vger.kernel.org.
+ carnil> Seems to have been applied to 4.14+
+ carnil> But according to Andy Lutomirski malicious userspace could
+ canril> possibly use the respective fixed bug to crash the kernel
+ carnil> even withouth the offending patch (3ac6d8c787b8) applied.
+Bugs:
+upstream: released (4.18-rc8) [b3681dd548d06deb2e1573890829dff4b15abf46]
+4.9-upstream-stable: released (4.9.124) [987156381c5f875d75ef1f7cc29994d82f646dad]
+3.16-upstream-stable: released (3.16.58) [x86-entry-64-remove-ebx-handling-from-error_entry-exit.patch]
+sid: released (4.17.14-1)
+4.9-stretch-security: released (4.9.110-3+deb9u5) [bugfix/x86/x86-entry-64-Remove-ebx-handling-from-error_entry-ex.patch]
+3.16-jessie-security: released (3.16.59-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy