summaryrefslogtreecommitdiffstats
path: root/active/CVE-2020-2732
blob: 3ff7ddbab481d3e6fbf6a5ec1342e67f8117fbaa (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Description: kvm: nVMX: L2 guest may trick the L0 hypervisor to access sensitive L1 resources
References:
 https://bugzilla.redhat.com/show_bug.cgi?id=1805135
 https://www.spinics.net/lists/kvm/msg208259.html
 https://lore.kernel.org/stable/20200304085113.GA1419475@kroah.com/
Notes:
 carnil> Only the patch which was Cc'ed to stable@vger.kernel.org is
 carnil> strictly needed to adress the CVE, see
 carnil> https://lore.kernel.org/stable/20200304085113.GA1419475@kroah.com/
Bugs:
upstream: released (5.6-rc4) [07721feee46b4b248402133228235318199b05ec, 35a571346a94fb93b5b3b6a599675ef3384bc75c, e71237d3ff1abf9f3388337cfebf53b96df2020d]
4.19-upstream-stable: released (4.19.107) [ed9e97c35b454ceb1da4f65c318015a7ab298dae, 85dd0eb771e8cef7839dbd4cb61acde0b86ecd9e, e5c0857bd5ccf34d93b5b1ea858ab3d81a685b08]
4.9-upstream-stable: released (4.9.215) [86dc39e580d8e3ffa42c8157d3e28249fd9a12c5, f3e0dfb310e6a6f0190dbb3d6b337513b548507b, 35523a2d9918e36ad4fa6c9c0176279d7c1f4291]
3.16-upstream-stable:
sid: pending (5.5.13-1)
4.19-buster-security:
4.9-stretch-security:
3.16-jessie-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy