[kernel-sec-discuss] r1555 - active

Michael Gilbert gilbert-guest at alioth.debian.org
Thu Oct 29 15:19:33 UTC 2009


Author: gilbert-guest
Date: 2009-10-29 15:19:28 +0000 (Thu, 29 Oct 2009)
New Revision: 1555

Added:
   active/CVE-2009-3722
Removed:
   active/CVE-2009-potential-priviledge-escalation-in-kvm-vmx
Log:
cve assigned

Copied: active/CVE-2009-3722 (from rev 1554, active/CVE-2009-potential-priviledge-escalation-in-kvm-vmx)
===================================================================
--- active/CVE-2009-3722	                        (rev 0)
+++ active/CVE-2009-3722	2009-10-29 15:19:28 UTC (rev 1555)
@@ -0,0 +1,15 @@
+Candidate:
+Description:
+ Debug registers may only be accessed from cpl 0.  Unfortunately, vmx will
+ code to emulate the instruction even though it was issued from guest
+ userspace, possibly leading to an unexpected trap later.
+References:
+ http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.31.y.git;a=commitdiff;h=bd634611e589582bba636434af7fcbf782eceb42
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream: released (2.6.31.1) [bd634611e589582bba636434af7fcbf782eceb42], released (2.6.32-rc1) [0a79b009525b160081d75cef5dbf45817956acf2]
+linux-2.6:
+2.6.18-etch-security: N/A "introduced in 2.6.30-rc1"
+2.6.24-etch-security: N/A "introduced in 2.6.30-rc1"
+2.6.26-lenny-security: N/A "introduced in 2.6.30-rc1"

Deleted: active/CVE-2009-potential-priviledge-escalation-in-kvm-vmx
===================================================================
--- active/CVE-2009-potential-priviledge-escalation-in-kvm-vmx	2009-10-28 22:07:14 UTC (rev 1554)
+++ active/CVE-2009-potential-priviledge-escalation-in-kvm-vmx	2009-10-29 15:19:28 UTC (rev 1555)
@@ -1,15 +0,0 @@
-Candidate:
-Description:
- Debug registers may only be accessed from cpl 0.  Unfortunately, vmx will
- code to emulate the instruction even though it was issued from guest
- userspace, possibly leading to an unexpected trap later.
-References:
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.31.y.git;a=commitdiff;h=bd634611e589582bba636434af7fcbf782eceb42
-Ubuntu-Description:
-Notes:
-Bugs:
-upstream: released (2.6.31.1)
-linux-2.6:
-2.6.18-etch-security:
-2.6.24-etch-security:
-2.6.26-lenny-security:




More information about the kernel-sec-discuss mailing list