summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2016-4557
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2016-05-08 04:14:15 +0000
committerSalvatore Bonaccorso <carnil@debian.org>2016-05-08 04:14:15 +0000
commit93141c8dc8b935aa1400fd13861331c7c0725248 (patch)
treea3f5fd2a32b90880ff8f32abeb760f2b6ffed6a2 /retired/CVE-2016-4557
parent2a8171fd92f48804feb6124906d2fd78666e07f8 (diff)
Retire CVE-2016-4557
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4363 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-4557')
-rw-r--r--retired/CVE-2016-455713
1 files changed, 13 insertions, 0 deletions
diff --git a/retired/CVE-2016-4557 b/retired/CVE-2016-4557
new file mode 100644
index 00000000..3e4a2b1f
--- /dev/null
+++ b/retired/CVE-2016-4557
@@ -0,0 +1,13 @@
+Description: UAF via double-fdput() in bpf(BPF_PROG_LOAD) error path
+References:
+ https://bugs.chromium.org/p/project-zero/issues/detail?id=808
+Notes:
+ Introduced by: https://git.kernel.org/linus/0246e64d9a5fcd4805198de59b9b5cf1f974eb41 (v3.18-rc1)
+ Exploitable since: https://git.kernel.org/linus/1be7f75d1668d6296b80bf35dcf6762393530afc (v4.4-rc1)
+Bugs:
+upstream: released (4.6-rc6) [8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7]
+3.16-upstream-stable: N/A "Vulnerable code introduced in 0246e64d9a5fcd4805198de59b9b5cf1f974eb41 (3.18-rc1)"
+3.2-upstream-stable: N/A "Vulnerable code introduced in 0246e64d9a5fcd4805198de59b9b5cf1f974eb41 (3.18-rc1)"
+sid: released (4.5.3-1) [bugfix/all/bpf-fix-double-fdput-in-replace_map_fd_with_map_ptr.patch]
+3.16-jessie-security: N/A "Vulnerable code not present"
+3.2-wheezy-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy