[kernel-sec-discuss] r5647 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Thu Oct 12 18:44:28 UTC 2017


Author: carnil
Date: 2017-10-12 18:44:28 +0000 (Thu, 12 Oct 2017)
New Revision: 5647

Modified:
   active/CVE-2017-12188
Log:
Update status for CVE-2017-12188

Modified: active/CVE-2017-12188
===================================================================
--- active/CVE-2017-12188	2017-10-12 17:00:07 UTC (rev 5646)
+++ active/CVE-2017-12188	2017-10-12 18:44:28 UTC (rev 5647)
@@ -1,13 +1,20 @@
-Description: KVM: MMU potential stack buffer overrun during page walks 
+Description: KVM: MMU potential stack buffer overrun during page walks
 References:
  https://bugzilla.redhat.com/show_bug.cgi?id=1500380
+ https://www.spinics.net/lists/kvm/msg156651.html
 Notes:
+ carnil> According to Paolo Bonzini, only
+ carnil> https://www.spinics.net/lists/kvm/msg156650.html
+ carnil> is needed to fix CVE-2017-12188
+ carnil> Issue might thus only affect kernels starting from 4.6-rc1
+ carnil> but I'm not 100% certain on the last claim or if we should
+ carnil> adress the issue as well for kernels later than 3.12-rc1
 Bugs:
-upstream:
-4.9-upstream-stable:
+upstream: needed
+4.9-upstream-stable: needed
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid:
-4.9-stretch-security:
+sid: needed
+4.9-stretch-security: needed
 3.16-jessie-security:
 3.2-wheezy-security:




More information about the kernel-sec-discuss mailing list