cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~ cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~ cpe:/o:debian:debian_linux:7.0 cpe:/o:linux:linux_kernel:4.15.7 CVE-2018-7995 2018-03-09T10:29:00.407-05:00 2019-02-28T15:34:10.170-05:00 4.7 LOCAL MEDIUM NONE NONE NONE COMPLETE http://nvd.nist.gov 2019-02-28T10:21:33.490-05:00 BID 103356 DEBIAN DSA-4187 DEBIAN DSA-4188 UBUNTU USN-3654-1 UBUNTU USN-3654-2 UBUNTU USN-3656-1 MLIST [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update MISC https://bugzilla.suse.com/show_bug.cgi?id=1084755 MISC https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b3b7c4795ccab5be71f080774c45bbbcc75c2aaf MISC https://lkml.org/lkml/2018/3/2/970 ** DISPUTED ** Race condition in the store_int_with_restart() function in arch/x86/kernel/cpu/mcheck/mce.c in the Linux kernel through 4.15.7 allows local users to cause a denial of service (panic) by leveraging root access to write to the check_interval file in a /sys/devices/system/machinecheck/machinecheck<cpu number> directory. NOTE: a third party has indicated that this report is not security relevant.