-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This issue was assigned CVE-2014-1438 and has now been fixed in kernel mainline. Since analysis showed, that it is not specific to vm86-mode, new bug description could be similar to OSVDB: "restore_fpu_checking Function Unhandled FPU Exception Local DoS"
See [1] for patch, [2] for information about CVE-assignment, at [3] you can find references to various resources related to this bug, e.g. the mailing list posts, POC code for crash and privilege escalation. [1] https://lkml.org/lkml/2014/1/11/196 [2] http://www.openwall.com/lists/oss-security/2014/01/14/1 [3] http://www.halfdog.net/Security/2013/Vm86SyscallTaskSwitchKernelPanic/ - -- http://www.halfdog.net/ PGP: 156A AE98 B91F 0114 FE88 2BD8 C459 9386 feed a bee -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlLU4GUACgkQxFmThv7tq+7CxgCdGHW5AIIGLoO0CXTuJypIYsvU xrYAnRFi2QvDrBs3tnIkxvF+F3xpGZAj =H8Vy -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: http://lists.debian.org/[email protected]

