** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Raring)
Status: New => Invalid
** Description changed:
- kvm: BUG_ON() in apic_cluster_id()
+ The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM
+ subsystem in the Linux kernel through 3.12.5 allows guest OS users to
+ cause a denial of service (host OS crash) via a crafted ICR write
+ operation in x2apic mode.
- Break-Fix: - 17d68b763f09a9ce824ae23eb62c9efc57b69271
+ Break-Fix: 1e08ec4a130e2745d96df169e67c58df98a07311
+ 17d68b763f09a9ce824ae23eb62c9efc57b69271
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1261570
Title:
CVE-2013-6376
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1261570/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs