[kernel-sec-discuss] r4170 - active retired

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed Feb 17 12:26:02 UTC 2016


Author: jmm
Date: 2016-02-17 12:26:02 +0000 (Wed, 17 Feb 2016)
New Revision: 4170

Added:
   retired/CVE-2015-5307
Removed:
   active/CVE-2015-5307
Log:
retire


Deleted: active/CVE-2015-5307
===================================================================
--- active/CVE-2015-5307	2016-02-17 12:25:41 UTC (rev 4169)
+++ active/CVE-2015-5307	2016-02-17 12:26:02 UTC (rev 4170)
@@ -1,12 +0,0 @@
-Description: Denial of service by KVM guest using #AC exception
-References:
-Notes:
-Bugs:
-upstream: released (4.4-rc1) [54a20552e1eae07aa240fa370a0293e006b5faed]
-3.16-upstream-stable: released (v3.16.7-ckt21) [033edc3a7d4c3fd1560aa41e051d6e79b9545ed0]
-3.2-upstream-stable: released (3.2.73) [kvm-x86-work-around-infinite-loop-in-microcode-when-ac-is.patch]
-2.6.32-upstream-stable: ignored "end of life"
-sid: released (4.2.6-1) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
-3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
-3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
-2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"

Copied: retired/CVE-2015-5307 (from rev 4169, active/CVE-2015-5307)
===================================================================
--- retired/CVE-2015-5307	                        (rev 0)
+++ retired/CVE-2015-5307	2016-02-17 12:26:02 UTC (rev 4170)
@@ -0,0 +1,12 @@
+Description: Denial of service by KVM guest using #AC exception
+References:
+Notes:
+Bugs:
+upstream: released (4.4-rc1) [54a20552e1eae07aa240fa370a0293e006b5faed]
+3.16-upstream-stable: released (v3.16.7-ckt21) [033edc3a7d4c3fd1560aa41e051d6e79b9545ed0]
+3.2-upstream-stable: released (3.2.73) [kvm-x86-work-around-infinite-loop-in-microcode-when-ac-is.patch]
+2.6.32-upstream-stable: ignored "end of life"
+sid: released (4.2.6-1) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"




More information about the kernel-sec-discuss mailing list