diff options
author | Ben Hutchings <benh@debian.org> | 2017-03-14 14:41:30 +0000 |
---|---|---|
committer | Ben Hutchings <benh@debian.org> | 2017-03-14 14:41:30 +0000 |
commit | 8a44df4fec5f79355bc39998060326e21d404fbb (patch) | |
tree | b913998f6a1fc5233b4593e1a48a5454dc2818b3 /retired/CVE-2015-2877 | |
parent | 710455f232bc6c860e183658a65f137b146a9957 (diff) |
Ignore CVE-2015-2877 for all branches, and retire it
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5077 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2015-2877')
-rw-r--r-- | retired/CVE-2015-2877 | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/retired/CVE-2015-2877 b/retired/CVE-2015-2877 new file mode 100644 index 00000000..bccd0c82 --- /dev/null +++ b/retired/CVE-2015-2877 @@ -0,0 +1,15 @@ +Description: Cross-VM ASL INtrospection (CAIN) +References: + https://www.usenix.org/conference/woot15/workshop-program/presentation/barresi + http://www.antoniobarresi.com/files/cain_advisory.txt +Notes: + bwh> Depends on KSM, which needs to be explicitly enabled at run-time. + bwh> It appears to be impractical to fix or mitigate this in KSM. +Bugs: +upstream: ignored "Intrinsic risk of KSM feature" +4.9-upstream-stable: ignored "Intrinsic risk of KSM feature" +3.16-upstream-stable: ignored "Intrinsic risk of KSM feature" +3.2-upstream-stable: ignored "Intrinsic risk of KSM feature" +sid: ignored "Intrinsic risk of KSM feature" +3.16-jessie-security: ignored "Intrinsic risk of KSM feature" +3.2-wheezy-security: ignored "Intrinsic risk of KSM feature" |