Description: arm64 Linux kernel: Privilege escalation by taking control of the KVM hypervisor References: https://www.openwall.com/lists/oss-security/2018/10/02/2 Notes: Bugs: upstream: released (4.19-rc7) [d26c25a9d19b5976b319af528886f89cf455692d, 2a3f93459d689d990b3ecfbe782fec89b97d3279] 4.19-upstream-stable: N/A "Fixed before branch point" 4.9-upstream-stable: released (4.9.131) [bc769c0148cd9820c8db785a2a1298a6489125ae, 53819c17ecbee86089396e6e7ae1f3e6de958db9] 3.16-upstream-stable: ignored "Too difficult to backport" sid: released (4.18.10-2) [bugfix/arm64/arm64-kvm-tighten-guest-core-register-access-from-us.patch, bugfix/arm64/arm64-kvm-sanitize-pstate.m-when-being-set-from-user.patch] 4.9-stretch-security: released (4.9.110-3+deb9u6) [bugfix/arm64/arm64-kvm-tighten-guest-core-register-access-from-userspace.patch, bugfix/arm64/arm64-kvm-sanitize-pstate.m-when-being-set-from-userspace.patch] 3.16-jessie-security: ignored "arm64 not supported in jessie LTS"