summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2016-3695
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2017-02-03 17:52:19 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2017-02-03 17:52:19 +0000
commit44d4bcccf95687a3ca9bda0c131d6632d88a699b (patch)
tree4d1fd870c651a27568435717e896d7082ec02766 /retired/CVE-2016-3695
parent7cff0a6930d27da6588c9457cb79905902399364 (diff)
new securelevel issue, already fixed
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4895 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-3695')
-rw-r--r--retired/CVE-2016-369512
1 files changed, 12 insertions, 0 deletions
diff --git a/retired/CVE-2016-3695 b/retired/CVE-2016-3695
new file mode 100644
index 00000000..91051414
--- /dev/null
+++ b/retired/CVE-2016-3695
@@ -0,0 +1,12 @@
+Description: Error injection via EINJ is allowed when securelevel is enabled
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3695
+ https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420
+Notes:
+Bugs:
+upstream: N/A "securelevel patch not upstream"
+3.16-upstream-stable: N/A "Vulnerable code not present"
+3.2-upstream-stable: N/A "Vulnerable code not present"
+sid: released (4.5.1-1)
+3.16-jessie-security: N/A "Vulnerable code not present"
+3.2-wheezy-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy