summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2016-10208
diff options
context:
space:
mode:
authorBen Hutchings <benh@debian.org>2017-11-17 14:13:18 +0000
committerBen Hutchings <benh@debian.org>2017-11-17 14:13:18 +0000
commit3fcca4cbb9bd55a91322b0718fc1efc75fd7c0a4 (patch)
treeec9f3f1c79868fac6d63c04bafb419a557169cd8 /retired/CVE-2016-10208
parent8e0e027272cb2f4af39d798fbd9e6795bfddbe77 (diff)
Bring CVE-2016-10208 out of retirement as it still affects 3.2
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5726 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-10208')
-rw-r--r--retired/CVE-2016-1020816
1 files changed, 0 insertions, 16 deletions
diff --git a/retired/CVE-2016-10208 b/retired/CVE-2016-10208
deleted file mode 100644
index 9484bb3c..00000000
--- a/retired/CVE-2016-10208
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: ext4 memory corruption
-References:
- https://bugzilla.suse.com/show_bug.cgi?id=1023377
- https://bugzilla.redhat.com/show_bug.cgi?id=1395190
- http://www.spinics.net/lists/linux-ext4/msg54572.html
-Notes:
- bwh> Initial upstream fix was too strict, causing a regression; see commit
- bwh> 2ba3e6e8afc9 ("ext4: fix fencepost in s_first_meta_bg validation")
-Bugs:
-upstream: released (4.10-rc1) [3a4b77cd47bb837b8557595ec7425f281f2ca1fe]
-4.9-upstream-stable: released (4.9.9) [13e6ef99d23b05807e7f8a72f45e3d8260b61570]
-3.16-upstream-stable: released (3.16.41) [cde863587b6809fdf61ea3c5391ecf06884b5516]
-3.2-upstream-stable: N/A "Introduced in 3.6-rc1 with 952fc18ef9ec707ebdc16c0786ec360295e5ff15"
-sid: released (4.9.10-1)
-3.16-jessie-security: released (3.16.43-1) [bugfix/all/ext4-validate-s_first_meta_bg-at-mount-time.patch]
-3.2-wheezy-security: N/A "Introduced in 3.6-rc1 with 952fc18ef9ec707ebdc16c0786ec360295e5ff15"

© 2014-2024 Faster IT GmbH | imprint | privacy policy