diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2017-02-03 17:52:19 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2017-02-03 17:52:19 +0000 |
commit | 44d4bcccf95687a3ca9bda0c131d6632d88a699b (patch) | |
tree | 4d1fd870c651a27568435717e896d7082ec02766 /retired/CVE-2016-3695 | |
parent | 7cff0a6930d27da6588c9457cb79905902399364 (diff) |
new securelevel issue, already fixed
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4895 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-3695')
-rw-r--r-- | retired/CVE-2016-3695 | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/retired/CVE-2016-3695 b/retired/CVE-2016-3695 new file mode 100644 index 00000000..91051414 --- /dev/null +++ b/retired/CVE-2016-3695 @@ -0,0 +1,12 @@ +Description: Error injection via EINJ is allowed when securelevel is enabled +References: + https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-3695 + https://github.com/mjg59/linux/commit/d7a6be58edc01b1c66ecd8fcc91236bfbce0a420 +Notes: +Bugs: +upstream: N/A "securelevel patch not upstream" +3.16-upstream-stable: N/A "Vulnerable code not present" +3.2-upstream-stable: N/A "Vulnerable code not present" +sid: released (4.5.1-1) +3.16-jessie-security: N/A "Vulnerable code not present" +3.2-wheezy-security: N/A "Vulnerable code not present" |