diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2014-04-29 15:02:58 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2014-04-29 15:02:58 +0000 |
commit | a972d9f5d28ebd885844d82b35846bc289c8379b (patch) | |
tree | e1ff5fc8bc0a38af7b779baed389fc84758c1387 /retired/CVE-2014-0101 | |
parent | f54efaff3d75a45787945cfbc11b6d66c3e14b65 (diff) |
retire (no need to wait for 2.6.32.x releases)
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3334 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2014-0101')
-rw-r--r-- | retired/CVE-2014-0101 | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/retired/CVE-2014-0101 b/retired/CVE-2014-0101 new file mode 100644 index 00000000..158d363b --- /dev/null +++ b/retired/CVE-2014-0101 @@ -0,0 +1,11 @@ +Description: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk +References: + http://patchwork.ozlabs.org/patch/325898/ +Notes: +Bugs: +upstream: released (3.14-rc3) [ec0223ec48a90cb605244b45f7c62de856403729] +2.6.32-upstream-stable: pending +sid: released (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch] +3.2-wheezy-security: released (3.2.56-1) +2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch] +3.2-upstream-stable: released (3.2.56) |