[kernel-sec-discuss] r5644 - active retired

Salvatore Bonaccorso carnil at moszumanska.debian.org
Thu Oct 12 11:38:08 UTC 2017


Author: carnil
Date: 2017-10-12 11:38:08 +0000 (Thu, 12 Oct 2017)
New Revision: 5644

Added:
   retired/CVE-2017-7518
Removed:
   active/CVE-2017-7518
Log:
Retire CVE-2017-7518

Deleted: active/CVE-2017-7518
===================================================================
--- active/CVE-2017-7518	2017-10-12 11:38:07 UTC (rev 5643)
+++ active/CVE-2017-7518	2017-10-12 11:38:08 UTC (rev 5644)
@@ -1,17 +0,0 @@
-Description: KVM: debug exception via syscall emulation
-References:
- http://www.openwall.com/lists/oss-security/2017/06/23/5
- https://www.spinics.net/lists/kvm/msg151817.html (upstream patch)
-Notes:
- bwh> Introduced by commit 663f4c61b803 "KVM: x86: handle singlestep during
- bwh> emulation".
-Bugs:
- https://bugzilla.redhat.com/show_bug.cgi?id=1464473
-upstream: released (4.12-rc7) [c8401dda2f0a00cd25c0af6a95ed50e478d25de4]
-4.9-upstream-stable: released (4.9.55) [922e562b2613ae713d661c4fc0f92662f4fe6c41]
-3.16-upstream-stable: released (3.16.45) [24ee2a286de7ac680ad4b2423c2dcee68444e567]
-3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: released (4.11.11-1)
-4.9-stretch-security: released (4.9.30-2+deb9u4) [bugfix/x86/kvm-x86-fix-singlestepping-over-syscall.patch]
-3.16-jessie-security: released (3.16.43-2+deb8u4) [bugfix/x86/kvm-x86-fix-singlestepping-over-syscall.patch]
-3.2-wheezy-security: N/A "Vulnerable code not present"

Copied: retired/CVE-2017-7518 (from rev 5643, active/CVE-2017-7518)
===================================================================
--- retired/CVE-2017-7518	                        (rev 0)
+++ retired/CVE-2017-7518	2017-10-12 11:38:08 UTC (rev 5644)
@@ -0,0 +1,17 @@
+Description: KVM: debug exception via syscall emulation
+References:
+ http://www.openwall.com/lists/oss-security/2017/06/23/5
+ https://www.spinics.net/lists/kvm/msg151817.html (upstream patch)
+Notes:
+ bwh> Introduced by commit 663f4c61b803 "KVM: x86: handle singlestep during
+ bwh> emulation".
+Bugs:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1464473
+upstream: released (4.12-rc7) [c8401dda2f0a00cd25c0af6a95ed50e478d25de4]
+4.9-upstream-stable: released (4.9.55) [922e562b2613ae713d661c4fc0f92662f4fe6c41]
+3.16-upstream-stable: released (3.16.45) [24ee2a286de7ac680ad4b2423c2dcee68444e567]
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: released (4.11.11-1)
+4.9-stretch-security: released (4.9.30-2+deb9u4) [bugfix/x86/kvm-x86-fix-singlestepping-over-syscall.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u4) [bugfix/x86/kvm-x86-fix-singlestepping-over-syscall.patch]
+3.2-wheezy-security: N/A "Vulnerable code not present"




More information about the kernel-sec-discuss mailing list