blob: d17ddeadbab0b8e462fcbbb66d625a32d8be8a1d (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
|
Candidate: CVE-2009-1242
Description:
The vmx_set_msr function in arch/x86/kvm/vmx.c in the VMX
implementation in the KVM subsystem in the Linux kernel before
2.6.29.1 on the i386 platform allows guest OS users to cause a
denial of service (OOPS) by setting the EFER_LME (aka "Long mode
enable") bit in the Extended Feature Enable Register (EFER)
model-specific register, which is specific to the x86_64 platform.
References:
http://openwall.com/lists/oss-security/2009/04/01/3
http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-EFER-8585
http://www.globalsecuritymag.com/Vigil-nce-Linux-kernel-denial-of,20090402,8311
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=16175a796d061833aacfbd9672235f2d2725df65
http://patchwork.kernel.org/patch/15549/
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29.1
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.29-git1.log
Ubuntu-Description:
Notes:
Bugs:
upstream: released (2.6.29.1) [16175a796d061833aacfbd9672235f2d2725df65]
linux-2.6: released (2.6.29-2)
2.6.18-etch-security: N/A "no KVM"
2.6.24-etch-security: released (2.6.24-6~etchnhalf.8etch1) [bugfix/kvm-vmx-inhibit-EFER-access.patch]
2.6.26-lenny-security: released (2.6.26-15lenny1) [bugfix/x86/kvm-vmx-inhibit-EFER-access.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
2.6.27-intrepid-security:
|