diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2015-08-20 23:24:36 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2015-08-20 23:24:36 +0000 |
commit | 66f7fe07c8c53508b3dfff04d19a4958a42eabc2 (patch) | |
tree | 33e3413f0085913595baa6471706c0a817a7c31c /retired/CVE-2015-5157 | |
parent | 3ed3bcd0504006888d4eee041578a1cc5048e5ce (diff) |
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3908 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2015-5157')
-rw-r--r-- | retired/CVE-2015-5157 | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/retired/CVE-2015-5157 b/retired/CVE-2015-5157 new file mode 100644 index 00000000..7482fa0d --- /dev/null +++ b/retired/CVE-2015-5157 @@ -0,0 +1,14 @@ +Description: DoS or privilege escalation by triggering fault in NMI on x86_64 +References: https://marc.info/?l=oss-security&m=143758877425647&w=2 +Notes: + Seems to have been introduced by commit 3f3c8b8c4b2a ("x86: Add workaround + to NMI iret woes") in 3.3. +Bugs: +upstream: released (4.2-rc3) [9d05041679904b12c12421cbcf9cb5f4860a8d7b, 0e181bb58143cb4a2e8f01c281b0816cd0e4798e, 9b6e6a8334d56354853f9c255d1395c2ba570e0a] +3.16-upstream-stable: released (3.16.7-ckt16) +3.2-upstream-stable: N/A ("Vulnerable code not present") +2.6.32-upstream-stable: N/A ("Vulnerable code not present") +sid: released (4.0.8-2) +3.16-jessie-security: released (3.16.7-ckt11-1+deb8u2) +3.2-wheezy-security: N/A ("Vulnerable code not present") +2.6.32-squeeze-security: N/A ("Vulnerable code not present") |