summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2017-7518
blob: bd1a4b79269e2c70efd1c77d9bf2b099c1f686a9 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Description: KVM: debug exception via syscall emulation
References:
 http://www.openwall.com/lists/oss-security/2017/06/23/5
 https://www.spinics.net/lists/kvm/msg151817.html (upstream patch)
Notes:
 bwh> Introduced by commit 663f4c61b803 "KVM: x86: handle singlestep during
 bwh> emulation".
Bugs:
 https://bugzilla.redhat.com/show_bug.cgi?id=1464473
upstream: released (4.12-rc7) [c8401dda2f0a00cd25c0af6a95ed50e478d25de4]
4.9-upstream-stable: released (4.9.55) [922e562b2613ae713d661c4fc0f92662f4fe6c41]
3.16-upstream-stable: released (3.16.45) [24ee2a286de7ac680ad4b2423c2dcee68444e567]
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.11.11-1)
4.9-stretch-security: released (4.9.30-2+deb9u4) [bugfix/x86/kvm-x86-fix-singlestepping-over-syscall.patch]
3.16-jessie-security: released (3.16.43-2+deb8u4) [bugfix/x86/kvm-x86-fix-singlestepping-over-syscall.patch]
3.2-wheezy-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy