summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2015-2877
diff options
context:
space:
mode:
authorBen Hutchings <benh@debian.org>2017-03-14 14:41:30 +0000
committerBen Hutchings <benh@debian.org>2017-03-14 14:41:30 +0000
commit8a44df4fec5f79355bc39998060326e21d404fbb (patch)
treeb913998f6a1fc5233b4593e1a48a5454dc2818b3 /retired/CVE-2015-2877
parent710455f232bc6c860e183658a65f137b146a9957 (diff)
Ignore CVE-2015-2877 for all branches, and retire it
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5077 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2015-2877')
-rw-r--r--retired/CVE-2015-287715
1 files changed, 15 insertions, 0 deletions
diff --git a/retired/CVE-2015-2877 b/retired/CVE-2015-2877
new file mode 100644
index 00000000..bccd0c82
--- /dev/null
+++ b/retired/CVE-2015-2877
@@ -0,0 +1,15 @@
+Description: Cross-VM ASL INtrospection (CAIN)
+References:
+ https://www.usenix.org/conference/woot15/workshop-program/presentation/barresi
+ http://www.antoniobarresi.com/files/cain_advisory.txt
+Notes:
+ bwh> Depends on KSM, which needs to be explicitly enabled at run-time.
+ bwh> It appears to be impractical to fix or mitigate this in KSM.
+Bugs:
+upstream: ignored "Intrinsic risk of KSM feature"
+4.9-upstream-stable: ignored "Intrinsic risk of KSM feature"
+3.16-upstream-stable: ignored "Intrinsic risk of KSM feature"
+3.2-upstream-stable: ignored "Intrinsic risk of KSM feature"
+sid: ignored "Intrinsic risk of KSM feature"
+3.16-jessie-security: ignored "Intrinsic risk of KSM feature"
+3.2-wheezy-security: ignored "Intrinsic risk of KSM feature"

© 2014-2024 Faster IT GmbH | imprint | privacy policy