APPLIED (execpt Maverick): CVE-2012-0045

Stefan Bader stefan.bader at canonical.com
Thu Mar 15 13:50:33 UTC 2012


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

On 14.03.2012 23:18, Stefan Bader wrote:
> 32bit guests will crash (and 64bit guests may behave in a wrong way) for
> example by simply executing following nasm-demo-application: The reason
> seems a missing "invalid opcode"-trap (int6) for the syscall opcode "0f05",
> which is not available on Intel CPUs within non-longmodes, as also on some
> AMD CPUs within legacy-mode. (depending on CPU vendor, MSR_EFER and cpuid)
> 
> Problem got introduced in 2.6.32 (so Hardy is not affected) and recently
> fixed in a 3.3-rc. For Precise a simple cherry-pick of the two patches
> works. Previous releases require a increasing amount of tweaking. Following
> this email are the patches for Lucid till Precise. Since KVM virtualization
> is not an option for ARM and neither EC2, only the master branches should
> require this. If I did not forget something.
> 
> Changes tested on 32bit hosts/32bit guest for all releases and additionally
> on a 64bit host/32bit+64bit guest for Lucid.
> 
> -Stefan
> 
As Maverick is slowly phasing out (which I failed to realize), I kept this one
back until we get an assessment about its importance.
All other patches applied to the respective master-next branches.

- -Stefan
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=QFvM
-----END PGP SIGNATURE-----




More information about the kernel-team mailing list