** Description changed:

  arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit
  x86 platforms, when syscall auditing is enabled and the sep CPU feature
  flag is set, allows local users to cause a denial of service (OOPS and
  system crash) via an invalid syscall number, as demonstrated by number
  1000.
+ 
+ Break-Fix: - 554086d85e71f30abe46fc014fea31929a7c6a8a

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1334989

Title:
  CVE-2014-4508

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1334989/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to