[kernel-sec-discuss] r5647 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Thu Oct 12 18:44:28 UTC 2017
Author: carnil
Date: 2017-10-12 18:44:28 +0000 (Thu, 12 Oct 2017)
New Revision: 5647
Modified:
active/CVE-2017-12188
Log:
Update status for CVE-2017-12188
Modified: active/CVE-2017-12188
===================================================================
--- active/CVE-2017-12188 2017-10-12 17:00:07 UTC (rev 5646)
+++ active/CVE-2017-12188 2017-10-12 18:44:28 UTC (rev 5647)
@@ -1,13 +1,20 @@
-Description: KVM: MMU potential stack buffer overrun during page walks
+Description: KVM: MMU potential stack buffer overrun during page walks
References:
https://bugzilla.redhat.com/show_bug.cgi?id=1500380
+ https://www.spinics.net/lists/kvm/msg156651.html
Notes:
+ carnil> According to Paolo Bonzini, only
+ carnil> https://www.spinics.net/lists/kvm/msg156650.html
+ carnil> is needed to fix CVE-2017-12188
+ carnil> Issue might thus only affect kernels starting from 4.6-rc1
+ carnil> but I'm not 100% certain on the last claim or if we should
+ carnil> adress the issue as well for kernels later than 3.12-rc1
Bugs:
-upstream:
-4.9-upstream-stable:
+upstream: needed
+4.9-upstream-stable: needed
3.16-upstream-stable:
3.2-upstream-stable:
-sid:
-4.9-stretch-security:
+sid: needed
+4.9-stretch-security: needed
3.16-jessie-security:
3.2-wheezy-security:
More information about the kernel-sec-discuss
mailing list