diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2011-12-15 14:01:16 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2011-12-15 14:01:16 +0000 |
commit | 3a288a45b5bcae75a5d5e062158aa3456587134f (patch) | |
tree | 9da01ce4f19cbfdf7adb88c643a33109131d2ab9 /retired/CVE-2011-4081 | |
parent | 6b16710be859d7430a193b33a595fb2157336b2d (diff) |
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2569 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2011-4081')
-rw-r--r-- | retired/CVE-2011-4081 | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/retired/CVE-2011-4081 b/retired/CVE-2011-4081 new file mode 100644 index 00000000..1713c053 --- /dev/null +++ b/retired/CVE-2011-4081 @@ -0,0 +1,15 @@ +Description: CVE-2011-4081 +References: + https://bugzilla.redhat.com/show_bug.cgi?id=749475 + https://secunia.com/advisories/46584/ + https://bugs.gentoo.org/show_bug.cgi?id=388581 +Notes: + Not sure if this is exploitable without AF_ALG sockets. Upstream + change was cc'd to stable for 2.6.37+. + jmm> Submitted for 2.6.32 +Bugs: +upstream: released (3.1) [7ed47b7d142ec99ad6880bbbec51e9f12b3af74c] +2.6.32-upstream-stable: N/A "Not exploitable without AF_ALG sockets, confirmed by upstream" +sid: released (3.0.0-6) [bugfix/all/stable/3.0.8.patch] +2.6.26-lenny-security: N/A "CRYPTO_GHASH Introduced in 2.6.32" +2.6.32-squeeze-security: N/A "Not exploitable without AF_ALG sockets, confirmed by upstream" |