[kernel-sec-discuss] r4993 - dsa-texts
Ben Hutchings
benh at moszumanska.debian.org
Wed Feb 22 13:49:44 UTC 2017
Author: benh
Date: 2017-02-22 13:49:44 +0000 (Wed, 22 Feb 2017)
New Revision: 4993
Modified:
dsa-texts/3.16.39-1+deb8u1
Log:
Add descriptions of KVM issues to DSA text for 3.16.39-1+deb8u1
Modified: dsa-texts/3.16.39-1+deb8u1
===================================================================
--- dsa-texts/3.16.39-1+deb8u1 2017-02-22 13:32:21 UTC (rev 4992)
+++ dsa-texts/3.16.39-1+deb8u1 2017-02-22 13:49:44 UTC (rev 4993)
@@ -29,8 +29,25 @@
escalation.
CVE-2017-2583
+
+ Xiaohan Zhang reported that KVM for amd64 does not correctly
+ emulate loading of a null stack selector. This can be used by a
+ user in a guest VM for denial of service (on an Intel CPU) or to
+ escalate privileges within the VM (on an AMD CPU).
+
CVE-2017-2584
+
+ Dmitry Vyukov reported that KVM for x86 does not correctly emulate
+ memory access by the SGDT and SIDT instructions, which can result
+ in a use-after-free and information leak.
+
CVE-2017-2596
+
+ Dmitry Vyukov reported that KVM leaks page references when
+ emulating a VMON for a nested hypervisor. This can be used by a
+ privileged user in a guest VM for denial of service or possibly
+ to gain privileges in the host.
+
CVE-2017-2618
It was discovered that an off-by-one in the handling of SELinux
More information about the kernel-sec-discuss
mailing list