Back to bug 1314253
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Adam Mariš | 2016-03-03 09:53:26 UTC | Depends On | 1314255 | |
| Adam Mariš | 2016-03-03 09:57:48 UTC | Blocks | 1314257 | |
| Prasad Pandit | 2016-03-09 10:21:35 UTC | CC | prasad | |
| Whiteboard | impact=low,public=20160224,reported=20160226,source=oss-security,cvss2=3.3/AV:L/AC:M/Au:N/C:P/I:P/A:N,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected | impact=low,public=20160224,reported=20160226,source=oss-security,cvss2=3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected | ||
| Prasad Pandit | 2016-03-09 10:37:18 UTC | Doc Text | Linux kernel built with the Supervisor Mode Access Prevention(CONFIG_X86_SMAP) and the IA32 Emulation (CONFIG_IA32_EMULATION) support is vulnerable to a partial SMAP protection bypass issue. It occurs because the 'AC' processor flag, which controls kernel mode access to user-space memory pages, is not cleared when invoking IA32 system calls on 64-bit machines. A process/user could potentially use this issue to various malicious ends. | |
| Prasad Pandit | 2016-03-09 10:40:31 UTC | Depends On | 1316055 | |
| Prasad Pandit | 2016-03-09 10:40:42 UTC | Depends On | 1316056 | |
| Prasad Pandit | 2016-03-09 10:44:52 UTC | Depends On | 1316057 | |
| Prasad Pandit | 2016-03-09 10:47:12 UTC | Whiteboard | impact=low,public=20160224,reported=20160226,source=oss-security,cvss2=3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected | impact=low,public=20160224,reported=20160226,source=oss-security,cvss2=3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P,cwe=CWE-284,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected |
| Salvatore Bonaccorso | 2016-03-09 16:46:04 UTC | CC | carnil | |
| Slawomir Czarko | 2016-03-14 11:46:39 UTC | CC | slawomir | |
| Martin Prpič | 2016-03-15 11:33:49 UTC | Doc Text | Linux kernel built with the Supervisor Mode Access Prevention(CONFIG_X86_SMAP) and the IA32 Emulation (CONFIG_IA32_EMULATION) support is vulnerable to a partial SMAP protection bypass issue. It occurs because the 'AC' processor flag, which controls kernel mode access to user-space memory pages, is not cleared when invoking IA32 system calls on 64-bit machines. A process/user could potentially use this issue to various malicious ends. | |
| Linda Wang | 2016-04-29 16:41:39 UTC | CC | lvenanci | |
| John Skeoch | 2016-10-04 04:19:47 UTC | CC | pholasek | |
| PnT Account Manager | 2018-02-07 23:11:53 UTC | CC | agordeev | |
| PnT Account Manager | 2018-07-19 06:15:02 UTC | CC | mguzik | |
| PnT Account Manager | 2018-08-28 22:03:07 UTC | CC | lwang | |
| PnT Account Manager | 2018-10-24 21:29:44 UTC | CC | lvenanci | |
| Eric Sammons | 2019-02-08 14:58:42 UTC | CC | esammons | |
| Product Security DevOps Team | 2019-06-08 02:49:15 UTC | Status | NEW | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2019-06-08 02:49:15 UTC | |||
| Product Security DevOps Team | 2019-09-29 13:45:06 UTC | Whiteboard | impact=low,public=20160224,reported=20160226,source=oss-security,cvss2=3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P,cwe=CWE-284,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected |
Back to bug 1314253