summaryrefslogtreecommitdiffstats
path: root/active/CVE-2020-2732
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-03-05 05:45:18 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2020-03-05 05:45:18 +0100
commitecd95d28110408cfd8838f2fa5f4d8692d6103c8 (patch)
tree4fda4e0209f373708ad078eae6592ad80b94449d /active/CVE-2020-2732
parenta8f0eedb4a71b1a490e754d3b6df4da3caa65aba (diff)
Add note for CVE-2020-2732
Diffstat (limited to 'active/CVE-2020-2732')
-rw-r--r--active/CVE-2020-27324
1 files changed, 4 insertions, 0 deletions
diff --git a/active/CVE-2020-2732 b/active/CVE-2020-2732
index 3b6df004c..887b0cbf7 100644
--- a/active/CVE-2020-2732
+++ b/active/CVE-2020-2732
@@ -2,7 +2,11 @@ Description: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1805135
https://www.spinics.net/lists/kvm/msg208259.html
+ https://lore.kernel.org/stable/20200304085113.GA1419475@kroah.com/
Notes:
+ carnil> Only the patch which was Cc'ed to stable@vger.kernel.org is
+ carnil> strictly needed to adress the CVE, see
+ carnil> 20200304085113.GA1419475@kroah.com
Bugs:
upstream: released (5.6-rc4) [07721feee46b4b248402133228235318199b05ec, 35a571346a94fb93b5b3b6a599675ef3384bc75c, e71237d3ff1abf9f3388337cfebf53b96df2020d]
4.19-upstream-stable: released (4.19.107) [ed9e97c35b454ceb1da4f65c318015a7ab298dae, 85dd0eb771e8cef7839dbd4cb61acde0b86ecd9e, e5c0857bd5ccf34d93b5b1ea858ab3d81a685b08]

© 2014-2024 Faster IT GmbH | imprint | privacy policy