Bug 1295480 (CVE-2015-1142857)
Summary: | kernel: net: ethernet flow control vulnerability in SRIOV devices | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vladis Dronov <vdronov> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED UPSTREAM | QA Contact: | |||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | unspecified | CC: | agordeev, apevec, aquini, arm-mgr, bhu, carnil, chrisw, dhoward, esammons, fhrbata, gansalmon, gmollett, iboverma, itamar, jen, jforbes, jjoyce, jkacur, joelsmith, jonathan, jross, jschluet, jwboyer, kbasil, kernel-maint, kernel-mgr, kstutsma, lgoncalv, lhh, lpeer, lwang, madhu.chinakonda, markmc, matt, mburns, mchehab, mcressma, meissner, mguzik, nmurray, nyechiel, ovs-team, pholasek, plougher, rbryant, rt-maint, rvrbovsk, sclewis, slinaber, tdecacqu, williams | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2016-07-07 14:44:10 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 1295482 | ||||||
Bug Blocks: | 1288501 | ||||||
Attachments: |
|
Description
Vladis Dronov
2016-01-04 16:04:09 UTC
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1295482] Created attachment 1177348 [details]
oss-sec.CVE.request-Ethernet.flow.control.vulnerability.in.SRIOV.devices.html
Statement: This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG-2. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. is this cve for real ? it does not look in scope (In reply to Marcus Meissner from comment #5) > is this cve for real ? it does not look in scope Yes, it's in DWF scope. |