Back to bug 1314253

Who When What Removed Added
Adam Mariš 2016-03-03 09:53:26 UTC Depends On 1314255
Adam Mariš 2016-03-03 09:57:48 UTC Blocks 1314257
Prasad Pandit 2016-03-09 10:21:35 UTC CC prasad
Whiteboard impact=low,public=20160224,reported=20160226,source=oss-security,cvss2=3.3/AV:L/AC:M/Au:N/C:P/I:P/A:N,rhel-5/kernel=new,rhel-6/kernel=new,rhel-7/kernel=new,rhel-7/kernel-rt=new,mrg-2/realtime-kernel=new,rhelsa-7/arm-kernel=new,fedora-all/kernel=affected impact=low,public=20160224,reported=20160226,source=oss-security,cvss2=3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected
Prasad Pandit 2016-03-09 10:37:18 UTC Doc Text Linux kernel built with the Supervisor Mode Access Prevention(CONFIG_X86_SMAP) and the IA32 Emulation (CONFIG_IA32_EMULATION) support is vulnerable to a partial SMAP protection bypass issue. It occurs because the 'AC' processor flag, which controls kernel mode access to user-space memory pages, is not cleared when invoking IA32 system calls on 64-bit machines. A process/user could potentially use this issue to various malicious ends.
Prasad Pandit 2016-03-09 10:40:31 UTC Depends On 1316055
Prasad Pandit 2016-03-09 10:40:42 UTC Depends On 1316056
Prasad Pandit 2016-03-09 10:44:52 UTC Depends On 1316057
Prasad Pandit 2016-03-09 10:47:12 UTC Whiteboard impact=low,public=20160224,reported=20160226,source=oss-security,cvss2=3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected impact=low,public=20160224,reported=20160226,source=oss-security,cvss2=3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P,cwe=CWE-284,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected
Salvatore Bonaccorso 2016-03-09 16:46:04 UTC CC carnil
Slawomir Czarko 2016-03-14 11:46:39 UTC CC slawomir
Martin Prpič 2016-03-15 11:33:49 UTC Doc Text Linux kernel built with the Supervisor Mode Access Prevention(CONFIG_X86_SMAP) and the IA32 Emulation (CONFIG_IA32_EMULATION) support is vulnerable to a partial SMAP protection bypass issue. It occurs because the 'AC' processor flag, which controls kernel mode access to user-space memory pages, is not cleared when invoking IA32 system calls on 64-bit machines. A process/user could potentially use this issue to various malicious ends.
Linda Wang 2016-04-29 16:41:39 UTC CC lvenanci
John Skeoch 2016-10-04 04:19:47 UTC CC pholasek
PnT Account Manager 2018-02-07 23:11:53 UTC CC agordeev
PnT Account Manager 2018-07-19 06:15:02 UTC CC mguzik
PnT Account Manager 2018-08-28 22:03:07 UTC CC lwang
PnT Account Manager 2018-10-24 21:29:44 UTC CC lvenanci
Eric Sammons 2019-02-08 14:58:42 UTC CC esammons
Product Security DevOps Team 2019-06-08 02:49:15 UTC Status NEW CLOSED
Resolution --- ERRATA
Last Closed 2019-06-08 02:49:15 UTC
Product Security DevOps Team 2019-09-29 13:45:06 UTC Whiteboard impact=low,public=20160224,reported=20160226,source=oss-security,cvss2=3.7/AV:L/AC:H/Au:N/C:P/I:P/A:P,cwe=CWE-284,rhel-5/kernel=notaffected,rhel-6/kernel=notaffected,rhel-7/kernel=affected,rhel-7/kernel-rt=affected,mrg-2/realtime-kernel=affected,rhelsa-7/arm-kernel=notaffected,fedora-all/kernel=affected

Back to bug 1314253