summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2016-3672
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2016-06-28 08:34:54 +0000
committerSalvatore Bonaccorso <carnil@debian.org>2016-06-28 08:34:54 +0000
commit5995bb05fadb43acd248258147490c1c08ae951a (patch)
tree434a620c1e69976405abcdc237a569473d83544a /retired/CVE-2016-3672
parent98bb4c4104a3c0885f9feab828bf5cb178ec1fa1 (diff)
Retire several CVEs
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4499 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-3672')
-rw-r--r--retired/CVE-2016-367214
1 files changed, 14 insertions, 0 deletions
diff --git a/retired/CVE-2016-3672 b/retired/CVE-2016-3672
new file mode 100644
index 00000000..b9a143c8
--- /dev/null
+++ b/retired/CVE-2016-3672
@@ -0,0 +1,14 @@
+Description: Unlimiting the stack disables ASLR on i386
+References:
+ http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html
+Notes:
+ bwh> This problem has been known for a long time; I don't know why it got
+ bwh> a 2016 CVE ID. There is some risk of regression so we should
+ bwh> probably wait a while before backporting.
+Bugs:
+upstream: released (4.6-rc1) [8b8addf891de8a00e4d39fc32f93f7c5eb8feceb]
+3.16-upstream-stable: released (3.16.35) [x86-standardize-mmap_rnd-usage.patch, x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
+3.2-upstream-stable: released (3.2.80) [x86-standardize-mmap_rnd-usage.patch, x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
+sid: released (4.5.1-1) [bugfix/all/x86-mm-32-enable-full-randomization-on-i386-and-x86_.patch]
+3.16-jessie-security: released (3.16.7-ckt25-2+deb8u1) [bugfix/x86/x86-standardize-mmap_rnd-usage.patch, bugfix/x86/x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
+3.2-wheezy-security: released (3.2.81-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy