summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2009-1242
blob: d17ddeadbab0b8e462fcbbb66d625a32d8be8a1d (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Candidate: CVE-2009-1242
Description:
 The vmx_set_msr function in arch/x86/kvm/vmx.c in the VMX
 implementation in the KVM subsystem in the Linux kernel before
 2.6.29.1 on the i386 platform allows guest OS users to cause a
 denial of service (OOPS) by setting the EFER_LME (aka "Long mode
 enable") bit in the Extended Feature Enable Register (EFER)
 model-specific register, which is specific to the x86_64 platform. 
References:
 http://openwall.com/lists/oss-security/2009/04/01/3
 http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-EFER-8585
 http://www.globalsecuritymag.com/Vigil-nce-Linux-kernel-denial-of,20090402,8311
 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=16175a796d061833aacfbd9672235f2d2725df65
 http://patchwork.kernel.org/patch/15549/
 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29.1
 http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.29-git1.log 
Ubuntu-Description:
Notes:
Bugs:
upstream: released (2.6.29.1) [16175a796d061833aacfbd9672235f2d2725df65]
linux-2.6: released (2.6.29-2)
2.6.18-etch-security: N/A "no KVM"
2.6.24-etch-security: released (2.6.24-6~etchnhalf.8etch1) [bugfix/kvm-vmx-inhibit-EFER-access.patch]
2.6.26-lenny-security: released (2.6.26-15lenny1) [bugfix/x86/kvm-vmx-inhibit-EFER-access.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
2.6.27-intrepid-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy