Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 24 Oct 2009 13:09:04 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kvm: update_cr8_intercept() NULL
 pointer dereference when running without an apic

Please use CVE-2009-3640.

Thanks.

-- 
    JB


----- "Eugene Teo" <eugeneteo@...nel.sg> wrote:

> Quote from the upstream commit:
> "update_cr8_intercept() can be triggered from userspace while there
> is no apic present."
> 
> http://git.kernel.org/linus/88c808fd42b53a7e01a2ac3253ef31fef74cb5af
> 
> This one can be triggered via kvm_vcpu_ioctl() if /dev/kvm is user 
> accessible (which is recommended...). Fixed in v2.6.32-rc1.
> 
> Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.