summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2017-2584
blob: 414b5615ddbf6197074b2567b2c5762a7d514a33 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Description: kvm: use after free in complete_emulated_mmio
References:
 https://www.spinics.net/lists/kvm/msg143571.html
Notes:
 carnil> Introduced in 3.6-rc1 with 96051572c819194c37a8367624b285be10297eca,
 carnil> but after 4.10-rc1 with 283c95d0e3891b64087706b344a4b545d04a6e62
 carnil> also exploitable for kernel memory write.
Bugs:
 https://bugzilla.redhat.com/show_bug.cgi?id=1413001
upstream: released (4.10-rc4) [129a72a0d3c8e139a04512325384fe5ac119e74d]
4.9-upstream-stable: released (4.9.5) [736e77c07fba8b49cead504b885a82ce52c0ff10]
3.16-upstream-stable: released (3.16.41) [kvm-x86-introduce-segmented_write_std.patch]
3.2-upstream-stable: N/A "Vulnerable code introduced in 3.6-rc1 with 96051572c819194c37a8367624b285be10297eca"
sid: released (4.9.6-1)
3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/x86/kvm-x86-introduce-segmented_write_std.patch]
3.2-wheezy-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy