diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2016-05-08 04:14:15 +0000 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2016-05-08 04:14:15 +0000 |
commit | 93141c8dc8b935aa1400fd13861331c7c0725248 (patch) | |
tree | a3f5fd2a32b90880ff8f32abeb760f2b6ffed6a2 /retired/CVE-2016-4557 | |
parent | 2a8171fd92f48804feb6124906d2fd78666e07f8 (diff) |
Retire CVE-2016-4557
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4363 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-4557')
-rw-r--r-- | retired/CVE-2016-4557 | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/retired/CVE-2016-4557 b/retired/CVE-2016-4557 new file mode 100644 index 00000000..3e4a2b1f --- /dev/null +++ b/retired/CVE-2016-4557 @@ -0,0 +1,13 @@ +Description: UAF via double-fdput() in bpf(BPF_PROG_LOAD) error path +References: + https://bugs.chromium.org/p/project-zero/issues/detail?id=808 +Notes: + Introduced by: https://git.kernel.org/linus/0246e64d9a5fcd4805198de59b9b5cf1f974eb41 (v3.18-rc1) + Exploitable since: https://git.kernel.org/linus/1be7f75d1668d6296b80bf35dcf6762393530afc (v4.4-rc1) +Bugs: +upstream: released (4.6-rc6) [8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7] +3.16-upstream-stable: N/A "Vulnerable code introduced in 0246e64d9a5fcd4805198de59b9b5cf1f974eb41 (3.18-rc1)" +3.2-upstream-stable: N/A "Vulnerable code introduced in 0246e64d9a5fcd4805198de59b9b5cf1f974eb41 (3.18-rc1)" +sid: released (4.5.3-1) [bugfix/all/bpf-fix-double-fdput-in-replace_map_fd_with_map_ptr.patch] +3.16-jessie-security: N/A "Vulnerable code not present" +3.2-wheezy-security: N/A "Vulnerable code not present" |