diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2016-06-28 08:34:54 +0000 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2016-06-28 08:34:54 +0000 |
commit | 5995bb05fadb43acd248258147490c1c08ae951a (patch) | |
tree | 434a620c1e69976405abcdc237a569473d83544a /retired/CVE-2016-3672 | |
parent | 98bb4c4104a3c0885f9feab828bf5cb178ec1fa1 (diff) |
Retire several CVEs
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4499 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-3672')
-rw-r--r-- | retired/CVE-2016-3672 | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/retired/CVE-2016-3672 b/retired/CVE-2016-3672 new file mode 100644 index 00000000..b9a143c8 --- /dev/null +++ b/retired/CVE-2016-3672 @@ -0,0 +1,14 @@ +Description: Unlimiting the stack disables ASLR on i386 +References: + http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html +Notes: + bwh> This problem has been known for a long time; I don't know why it got + bwh> a 2016 CVE ID. There is some risk of regression so we should + bwh> probably wait a while before backporting. +Bugs: +upstream: released (4.6-rc1) [8b8addf891de8a00e4d39fc32f93f7c5eb8feceb] +3.16-upstream-stable: released (3.16.35) [x86-standardize-mmap_rnd-usage.patch, x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch] +3.2-upstream-stable: released (3.2.80) [x86-standardize-mmap_rnd-usage.patch, x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch] +sid: released (4.5.1-1) [bugfix/all/x86-mm-32-enable-full-randomization-on-i386-and-x86_.patch] +3.16-jessie-security: released (3.16.7-ckt25-2+deb8u1) [bugfix/x86/x86-standardize-mmap_rnd-usage.patch, bugfix/x86/x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch] +3.2-wheezy-security: released (3.2.81-1) |