DELTA 448985 0 2617
SVN j f . x}A N@ HXx^Rn0=WDӴւB&
mvڴc%$]"K)&qZ.ɳiJMi^,r$\O3
9*er61&ptѢ6 wZDzO]mKej'ΆAA%hlp1q+pCKFDvq%gMP!mVb.G=DWLW*ch?VWIFi^G}cbkT2hJeЪd#y Ed'; o#/@>M\7jkOs|-.bdg}'z֣SC ˦xqZaZObHiqv^y`39"*_F n6͆ h v} J|\ x^Mk0ͯr%v,az_JDtEɕơ+;tK|#m)+X.x64u{RGo
)WU+UUM2Lhhv>8uY<eJ-]2(+Xr>#a{0),rQ-ЗL| 1- w@ C@ m3Yx^͐ EWBfA$F +.RlM YqL.9,_;+ oeG(+hLEqi^1r;GNc\>1,
,rL4 =l)SbʾM'lcK|pkHޢ^j՛?sloe$#'Wp PY Mz x - Jv Qx^1o0g+NIUAn0tA0:ΑX8v*}mZڎt|{gƜ)I .z8Ɨ1[Ky2zUd#<# $KҧXg!d-?Mv`3ֻEHRq<#ex߹ǒH'5K$Ig9Mwh:b%]gP//:3Z{ޛ060
U5ul\wpRᣑ
!LK]_UX9ŮKPWfKq ^-;0!|Nrי !h ` N g? 'p 5 0pf task, LDTR loading needs to follow
protected mode semantics. This was violated by the code.
On SVM (AMD hardware): a malicious unprivileged guest process can
escalate its privilege to that of the guest operating system.
On both SVM and VMX (Intel hardware): a malicious unprivileged
guest process can crash the guestcvename>CVE-2016-9382250ac2e96-ba4d-11e6-ae1b-002590263bf5">
xen-kernel -- x86 null segments not always treated as unusable 6U w A t 4 addressed in FreeBSD-SA-16:25.bspatch, but some possible
integer overflows remainedfreebsdsa>SA-16:29.bspatch10-10
2016-10-10
mkvtoolnix -- code execution via specially crafted files
mkvtoolnix
9.4.1p>Moritz Bunkus reports: