* [Qemu-devel] [Bug 1432103] [NEW] error in x86 executable segment permission check
@ 2015-03-14 4:28 aegiryy
2018-02-26 20:56 ` [Qemu-devel] [Bug 1432103] " Thomas Huth
2018-04-28 4:17 ` Launchpad Bug Tracker
0 siblings, 2 replies; 3+ messages in thread
From: aegiryy @ 2015-03-14 4:28 UTC (permalink / raw)
To: qemu-devel
Public bug reported:
When the code segment register (%cs) selects an executable segment with
no read permission, mov instructions that read from the segment via %cs
prefix can still succeed without causing a general protection error.
** Affects: qemu
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1432103
Title:
error in x86 executable segment permission check
Status in QEMU:
New
Bug description:
When the code segment register (%cs) selects an executable segment
with no read permission, mov instructions that read from the segment
via %cs prefix can still succeed without causing a general protection
error.
To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1432103/+subscriptions
^ permalink raw reply [flat|nested] 3+ messages in thread
* [Qemu-devel] [Bug 1432103] Re: error in x86 executable segment permission check
2015-03-14 4:28 [Qemu-devel] [Bug 1432103] [NEW] error in x86 executable segment permission check aegiryy
@ 2018-02-26 20:56 ` Thomas Huth
2018-04-28 4:17 ` Launchpad Bug Tracker
1 sibling, 0 replies; 3+ messages in thread
From: Thomas Huth @ 2018-02-26 20:56 UTC (permalink / raw)
To: qemu-devel
Triaging old bug tickets... can you still reproduce this issue with the
latest version of QEMU? Or could we close this ticket nowadays? Can you
provide a binary to reproduce this issue?
** Changed in: qemu
Status: New => Incomplete
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1432103
Title:
error in x86 executable segment permission check
Status in QEMU:
Incomplete
Bug description:
When the code segment register (%cs) selects an executable segment
with no read permission, mov instructions that read from the segment
via %cs prefix can still succeed without causing a general protection
error.
To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1432103/+subscriptions
^ permalink raw reply [flat|nested] 3+ messages in thread
* [Qemu-devel] [Bug 1432103] Re: error in x86 executable segment permission check
2015-03-14 4:28 [Qemu-devel] [Bug 1432103] [NEW] error in x86 executable segment permission check aegiryy
2018-02-26 20:56 ` [Qemu-devel] [Bug 1432103] " Thomas Huth
@ 2018-04-28 4:17 ` Launchpad Bug Tracker
1 sibling, 0 replies; 3+ messages in thread
From: Launchpad Bug Tracker @ 2018-04-28 4:17 UTC (permalink / raw)
To: qemu-devel
[Expired for QEMU because there has been no activity for 60 days.]
** Changed in: qemu
Status: Incomplete => Expired
--
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
https://bugs.launchpad.net/bugs/1432103
Title:
error in x86 executable segment permission check
Status in QEMU:
Expired
Bug description:
When the code segment register (%cs) selects an executable segment
with no read permission, mov instructions that read from the segment
via %cs prefix can still succeed without causing a general protection
error.
To manage notifications about this bug go to:
https://bugs.launchpad.net/qemu/+bug/1432103/+subscriptions
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2018-04-28 4:30 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-03-14 4:28 [Qemu-devel] [Bug 1432103] [NEW] error in x86 executable segment permission check aegiryy
2018-02-26 20:56 ` [Qemu-devel] [Bug 1432103] " Thomas Huth
2018-04-28 4:17 ` Launchpad Bug Tracker
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.