summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2015-1421
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2015-02-24 15:47:33 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2015-02-24 15:47:33 +0000
commit7d1cfdb962bffefb3e1c3ae188b9f6aac088cf5d (patch)
tree8458495710db35847d9eab1fbc11a5682433a275 /retired/CVE-2015-1421
parentc853e5a24c8b013657a053bfd2d882285cfdfcd7 (diff)
retire (no need to wait for release of pending issues in 2.6.32.x LTS)
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3701 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2015-1421')
-rw-r--r--retired/CVE-2015-142113
1 files changed, 13 insertions, 0 deletions
diff --git a/retired/CVE-2015-1421 b/retired/CVE-2015-1421
new file mode 100644
index 00000000..292aef1b
--- /dev/null
+++ b/retired/CVE-2015-1421
@@ -0,0 +1,13 @@
+Description: Use-after-free in sctp triggered remotely
+References:
+ http://www.openwall.com/lists/oss-security/2015/01/29/13
+ https://git.kernel.org/linus/600ddd6825543962fb807884169e57b580dba208
+Notes:
+Bugs:
+upstream: released (3.19-rc7) [600ddd6825543962fb807884169e57b580dba208]
+2.6.32-upstream-stable: pending (2.6.32.66)
+sid: released (3.16.7-ckt4-3) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
+3.16-upstream-stable: released (3.16.7-ckt6)
+3.2-upstream-stable: released (3.2.67) [net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy