Description: KVM: debug exception via syscall emulation References: http://www.openwall.com/lists/oss-security/2017/06/23/5 https://www.spinics.net/lists/kvm/msg151817.html (upstream patch) Notes: bwh> Introduced by commit 663f4c61b803 "KVM: x86: handle singlestep during bwh> emulation". Bugs: https://bugzilla.redhat.com/show_bug.cgi?id=1464473 upstream: released (4.12-rc7) [c8401dda2f0a00cd25c0af6a95ed50e478d25de4] 4.9-upstream-stable: released (4.9.55) [922e562b2613ae713d661c4fc0f92662f4fe6c41] 3.16-upstream-stable: released (3.16.45) [24ee2a286de7ac680ad4b2423c2dcee68444e567] 3.2-upstream-stable: N/A "Vulnerable code not present" sid: released (4.11.11-1) 4.9-stretch-security: released (4.9.30-2+deb9u4) [bugfix/x86/kvm-x86-fix-singlestepping-over-syscall.patch] 3.16-jessie-security: released (3.16.43-2+deb8u4) [bugfix/x86/kvm-x86-fix-singlestepping-over-syscall.patch] 3.2-wheezy-security: N/A "Vulnerable code not present"