summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2015-3331
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2015-05-11 07:06:16 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2015-05-11 07:06:16 +0000
commitbedf1a9077c7bfcb19e94f8f3f4a4b27d8c14e54 (patch)
tree004fe98a0c53fe8655c177f481a9705e8c2d5dcf /retired/CVE-2015-3331
parentf0f891412a3d90f361a00211f68f3bd5a32c3041 (diff)
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3779 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2015-3331')
-rw-r--r--retired/CVE-2015-333113
1 files changed, 13 insertions, 0 deletions
diff --git a/retired/CVE-2015-3331 b/retired/CVE-2015-3331
new file mode 100644
index 00000000..87333610
--- /dev/null
+++ b/retired/CVE-2015-3331
@@ -0,0 +1,13 @@
+Description: Buffer overruns in Linux kernel RFC4106 implementation using AESNI
+References:
+Notes:
+Bugs:
+ - https://bugs.debian.org/782561
+upstream: released (v4.0-rc5) [ccfe8c3f7e52ae83155cb038753f4c75b774ca8a]
+2.6.32-upstream-stable: N/A "Introduced in v2.6.38-rc1 with 0bd82f5f6355775fbaf7d3c664432ce1b862be1e"
+sid: released (3.16.7-ckt9-3) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
+3.16-jessie-security: released (3.16.7-ckt9-3~deb8u1) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
+2.6.32-squeeze-security: N/A "Introduced in v2.6.38-rc1 with 0bd82f5f6355775fbaf7d3c664432ce1b862be1e"
+3.16-upstream-stable: released (3.16.7-ckt10)
+3.2-upstream-stable: released (3.2.69) [crypto-aesni-fix-memory-usage-in-gcm-decryption.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy