diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2015-02-24 15:47:33 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2015-02-24 15:47:33 +0000 |
commit | 7d1cfdb962bffefb3e1c3ae188b9f6aac088cf5d (patch) | |
tree | 8458495710db35847d9eab1fbc11a5682433a275 /retired/CVE-2015-1421 | |
parent | c853e5a24c8b013657a053bfd2d882285cfdfcd7 (diff) |
retire (no need to wait for release of pending issues in 2.6.32.x LTS)
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3701 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2015-1421')
-rw-r--r-- | retired/CVE-2015-1421 | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/retired/CVE-2015-1421 b/retired/CVE-2015-1421 new file mode 100644 index 00000000..292aef1b --- /dev/null +++ b/retired/CVE-2015-1421 @@ -0,0 +1,13 @@ +Description: Use-after-free in sctp triggered remotely +References: + http://www.openwall.com/lists/oss-security/2015/01/29/13 + https://git.kernel.org/linus/600ddd6825543962fb807884169e57b580dba208 +Notes: +Bugs: +upstream: released (3.19-rc7) [600ddd6825543962fb807884169e57b580dba208] +2.6.32-upstream-stable: pending (2.6.32.66) +sid: released (3.16.7-ckt4-3) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch] +3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch] +2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch] +3.16-upstream-stable: released (3.16.7-ckt6) +3.2-upstream-stable: released (3.2.67) [net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch] |