Description
arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly
initialize Code Segment (CS) in certain error cases, which allows local
users to obtain sensitive information from kernel stack memory via a
crafted application.
Ubuntu-Description
Dmitry Vyukov discovered that the KVM implementation in the Linux kernel
did not properly initialize the Code Segment (CS) in certain error cases. A
local attacker could use this to expose sensitive information (kernel
memory).
Notes
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support |
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Product
linux-krillin: | not-affected
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Patches:
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
This package is not directly supported by the Ubuntu Security Team
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored [out of standard support])
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was released [3.19.0-79.87~14.04.1])
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored [out of standard support])
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | released
(4.4.0-59.80~14.04.1)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
(trusty was ignored)
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Package
Upstream: | released
(4.9~rc7)
|
Ubuntu 14.04 ESM (Trusty Tahr): | DNE
|
Ubuntu 16.04 LTS (Xenial Xerus): | DNE
|
Product
linux-vegetahd: | not-affected
|
Updated: 2019-12-05 18:46:48 UTC (commit dd38ff22974aae499eb50644b9d5a2817483cbdb)