diff options
author | Ben Hutchings <benh@debian.org> | 2017-02-23 21:55:28 +0000 |
---|---|---|
committer | Ben Hutchings <benh@debian.org> | 2017-02-23 21:55:28 +0000 |
commit | c77a05b32b2f63a5cefb610c25affbe3a5afe807 (patch) | |
tree | 83c44ec760bac31786ce6385a318fbf76a8d8e81 /retired/CVE-2016-10088 | |
parent | 8006483d9aab4dfb5da87b728df3166107707e9e (diff) |
Retire many issues now released (or N/A or ignored) in all branches
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5001 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-10088')
-rw-r--r-- | retired/CVE-2016-10088 | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/retired/CVE-2016-10088 b/retired/CVE-2016-10088 new file mode 100644 index 00000000..31fdb7c8 --- /dev/null +++ b/retired/CVE-2016-10088 @@ -0,0 +1,15 @@ +Description: Memory corruption in SCSI generic device interface +References: + https://marc.info/?l=linux-scsi&m=148010092224801&w=2 + https://gist.githubusercontent.com/dvyukov/80cd94b4e4c288f16ee4c787d404118b/raw/10536069562444da51b758bb39655b514ff93b45/gistfile1.txt + http://www.openwall.com/lists/oss-security/2016/12/30/1 +Notes: + bwh> This is the vulnerabilbility left after fixing CVE-2016-9576. +Bugs: +upstream: released (4.10-rc1) [128394eff343fc6d2f32172f03e24829539c5835] +4.9-upstream-stable: released (4.9.2) [3f3a6bbe6f9f5e895d8945494173594ee51632da] +3.16-upstream-stable: released (3.16.40) [sg_write-bsg_write-is-not-fit-to-be-called-under-kernel_ds.patch] +3.2-upstream-stable: released (3.2.85) [sg_write-bsg_write-is-not-fit-to-be-called-under-kernel_ds.patch] +sid: released (4.8.15-2) [bugfix/all/sg_write-bsg_write-is-not-fit-to-be-called-under-KER.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/sg_write-bsg_write-is-not-fit-to-be-called-under-ker.patch] +3.2-wheezy-security: released (3.2.84-1) [bugfix/all/sg_write-bsg_write-is-not-fit-to-be-called-under-ker.patch] |