summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2016-0823
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2016-03-29 14:56:59 +0000
committerSalvatore Bonaccorso <carnil@debian.org>2016-03-29 14:56:59 +0000
commite69fa7040229fc35069c70623d312ea3a1c3a6f8 (patch)
tree169004c2c38703b653cc819fc345ab2660e7f620 /retired/CVE-2016-0823
parent9f84081213f6d0aa387858415f19fabde109abef (diff)
Retire CVE-2016-0823
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4287 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-0823')
-rw-r--r--retired/CVE-2016-082311
1 files changed, 11 insertions, 0 deletions
diff --git a/retired/CVE-2016-0823 b/retired/CVE-2016-0823
new file mode 100644
index 00000000..9deaf7f9
--- /dev/null
+++ b/retired/CVE-2016-0823
@@ -0,0 +1,11 @@
+Description: Leakage of physical addresses to non-privileged userspace
+References:
+ https://googleprojectzero.blogspot.cz/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
+Notes:
+Bugs:
+upstream: released (v4.0-rc5) [ab676b7d6fbf4b294bf198fb27ade5b0e865c7ce]
+3.16-upstream-stable: released (3.16.7-ckt10) [948e681e8731ab8b49d81d4a5b61b5bf3b3e6152]
+3.2-upstream-stable: released (3.2.69) [1ffc3cd9a36b504c20ce98fe5eeb5463f389e1ac]
+sid: released (4.0.2-1)
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u1)
+3.2-wheezy-security: released (3.2.73-2+deb7u1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy