** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2111834
Title: cve-2015-3290: TBROK: ENOENT in bionic/kvm Status in linux package in Ubuntu: New Status in linux source package in Bionic: New Bug description: SRU Cycle: s2025.04.14 Series: bionic Package: linux-kvm Version: 4.15.0-1164.169 Cloud: openstack Instance: amd64-vm Region: prod-kernel-sru-testing-amd64 Operation: sru Output: Checking for required user/group ids 'root' user id and group found. 'nobody' user id and group found. 'bin' user id and group found. 'daemon' user id and group found. Users group found. Sys group found. Required users/groups exist. no big block device was specified on commandline. Tests which require a big block device are disabled. You can specify it with option -z INFO: Test start time: Tue May 27 12:24:28 UTC 2025 COMMAND: /opt/ltp/bin/ltp-pan -q -e -S -a 1516 -n 1516 -f /tmp/ltp-yr64O1LuOv/alltests -l /dev/null -C /dev/null -T /dev/null LOG File: /dev/null FAILED COMMAND File: /dev/null TCONF COMMAND File: /dev/null Running tests....... tst_tmpdir.c:317: TINFO: Using /tmp/ltp-yr64O1LuOv/LTP_cveg02vs9 as tmpdir (ext2/ext3/ext4 filesystem) tst_test.c:1952: TINFO: LTP version: 20230929-1380-gc9e5b1e50 tst_test.c:1955: TINFO: Tested kernel: 4.15.0-1164-kvm #169-Ubuntu SMP Fri May 23 20:19:27 UTC 2025 x86_64 tst_kconfig.c:88: TINFO: Parsing kernel config '/lib/modules/4.15.0-1164-kvm/build/.config' tst_test.c:1775: TINFO: Overall timeout per run is 0h 03m 30s cve-2015-3290.c:424: TINFO: attempting to corrupt nested NMI stack state cve-2015-3290.c:200: TBROK: modify_ltd(1, 0x7ffef1cb58b0, 16) invalid retval -22: ENOENT (2) tst_test.c:439: TINFO: Child process reported TBROK killing the test tst_test.c:1836: TINFO: Killed the leftover descendant processes HINT: You _MAY_ be missing kernel fixes: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9b6e6a8334d5 HINT: You _MAY_ be vulnerable to CVE(s): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3290 Summary: passed 0 failed 0 broken 1 skipped 0 warnings 0 INFO: ltp-pan reported some tests FAIL LTP Version: 20230929-1380-gc9e5b1e50 INFO: Test end time: Tue May 27 12:24:28 UTC 2025 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2111834/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp