CVE-2016-5412 (retired)

Priority
Description
arch/powerpc/kvm/book3s_hv_rmhandlers.S in the Linux kernel through 4.7 on
PowerPC platforms, when CONFIG_KVM_BOOK3S_64_HV is enabled, allows guest OS
users to cause a denial of service (host OS infinite loop) by making a
H_CEDE hypercall during the existence of a suspended transaction.
Ubuntu-Description
It was discovered that the powerpc and powerpc64 hypervisor-mode KVM
implementation in the Linux kernel for did not properly maintain state
about transactional memory. An unprivileged attacker in a guest could cause
a denial of service (CPU lockup) in the host OS.
Notes
 jdstrand> android kernels (flo, goldfish, grouper, maguro, mako and manta) are
  not supported on the Ubuntu Touch 14.10 and earlier preview kernels
 jdstrand> linux-lts-saucy no longer receives official support
 jdstrand> linux-lts-quantal no longer receives official support
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1001.10)
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.4.0-1003.3)
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.8.0-36.36~16.04.1)
Package
linux-krillin:not-affected
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.4.0-1023.29)
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.4.0-1026.29)
Package
Upstream:released (4.8~rc1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
linux-vegetahd:not-affected
More Information

Updated: 2019-08-23 09:11:10 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)