summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2016-4794
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2016-06-28 08:34:54 +0000
committerSalvatore Bonaccorso <carnil@debian.org>2016-06-28 08:34:54 +0000
commit5995bb05fadb43acd248258147490c1c08ae951a (patch)
tree434a620c1e69976405abcdc237a569473d83544a /retired/CVE-2016-4794
parent98bb4c4104a3c0885f9feab828bf5cb178ec1fa1 (diff)
Retire several CVEs
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4499 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-4794')
-rw-r--r--retired/CVE-2016-479416
1 files changed, 16 insertions, 0 deletions
diff --git a/retired/CVE-2016-4794 b/retired/CVE-2016-4794
new file mode 100644
index 00000000..36afdcbd
--- /dev/null
+++ b/retired/CVE-2016-4794
@@ -0,0 +1,16 @@
+Description: Use-after-free in pcpu_extend_area_map, triggered by bpf()
+References:
+ Reproducer: http://www.openwall.com/lists/oss-security/2016/05/12/6
+ http://thread.gmane.org/gmane.linux.network/408459/
+ http://article.gmane.org/gmane.linux.kernel/2227891
+ http://article.gmane.org/gmane.linux.kernel/2227892
+Notes:
+ bwh> It's not clear whether this is specific to bpf() or an existing bug
+ bwh> that's now easier to hit (and exploit).
+Bugs:
+upstream: released (4.7-rc4) [4f996e234dad488e5d9ba0858bc1bae12eff82c3, 6710e594f71ccaad8101bc64321152af7cd9ea28]
+3.16-upstream-stable: N/A "Introduced with 1a4d76076cda and 9c824b6a172c in 3.18-rc1"
+3.2-upstream-stable: N/A "Introduced with 1a4d76076cda and 9c824b6a172c in 3.18-rc1"
+sid: released (4.6.2-2) [bugfix/all/percpu-fix-synchronization-between-chunk-map_extend_.patch, bugfix/all/percpu-fix-synchronization-between-synchronous-map-e.patch]
+3.16-jessie-security: N/A "Vulnerable code not present"
+3.2-wheezy-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy