diff options
author | Ben Hutchings <ben@decadent.org.uk> | 2020-06-07 18:13:11 +0100 |
---|---|---|
committer | Ben Hutchings <ben@decadent.org.uk> | 2020-06-07 18:13:24 +0100 |
commit | c09c3e2cf54cab80d7bcf0c31a2f70fdc344d5b6 (patch) | |
tree | 10913a624ba87c61c79aa822679c30dfccd5ae6b /dsa-texts/4.9.210-1+deb9u1 | |
parent | 3ad1034d77d2aa39b185db1cd963de4a74ae10be (diff) |
Copy descriptions for issues previously fixed in other suites
Diffstat (limited to 'dsa-texts/4.9.210-1+deb9u1')
-rw-r--r-- | dsa-texts/4.9.210-1+deb9u1 | 18 |
1 files changed, 15 insertions, 3 deletions
diff --git a/dsa-texts/4.9.210-1+deb9u1 b/dsa-texts/4.9.210-1+deb9u1 index 64c3f16a7..b01822315 100644 --- a/dsa-texts/4.9.210-1+deb9u1 +++ b/dsa-texts/4.9.210-1+deb9u1 @@ -52,7 +52,11 @@ CVE-2020-0543 CVE-2020-2732 - Description + Paulo Bonzini discovered that the KVM implementation for Intel + processors did not properly handle instruction emulation for L2 + guests when nested virtualization is enabled. This could allow an + L2 guest to cause privilege escalation, denial of service, or + information leaks in the L1 guest. CVE-2020-8428 @@ -92,7 +96,11 @@ CVE-2020-10757 CVE-2020-10942 - Description + It was discovered that the vhost_net driver did not properly + validate the type of sockets set as back-ends. A local user + permitted to access /dev/vhost-net could use this to cause a stack + corruption via crafted system calls, resulting in denial of + service (crash) or possibly privilege escalation. CVE-2020-11494 @@ -100,7 +108,11 @@ CVE-2020-11494 CVE-2020-11565 - Description + Entropy Moe reported that the shared memory filesystem (tmpfs) did + not correctly handle an "mpol" mount option specifying an empty + node list, leading to a stack-based out-of-bounds write. If user + namespaces are enabled, a local user could use this to cause a + denial of service (crash) or possibly for privilege escalation. CVE-2020-11608 |