diff options
author | Ben Hutchings <benh@debian.org> | 2017-02-23 21:55:28 +0000 |
---|---|---|
committer | Ben Hutchings <benh@debian.org> | 2017-02-23 21:55:28 +0000 |
commit | c77a05b32b2f63a5cefb610c25affbe3a5afe807 (patch) | |
tree | 83c44ec760bac31786ce6385a318fbf76a8d8e81 /retired/CVE-2016-8655 | |
parent | 8006483d9aab4dfb5da87b728df3166107707e9e (diff) |
Retire many issues now released (or N/A or ignored) in all branches
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5001 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-8655')
-rw-r--r-- | retired/CVE-2016-8655 | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/retired/CVE-2016-8655 b/retired/CVE-2016-8655 new file mode 100644 index 00000000..5b6228df --- /dev/null +++ b/retired/CVE-2016-8655 @@ -0,0 +1,14 @@ +Description: Linux af_packet.c race condition +References: + http://www.openwall.com/lists/oss-security/2016/12/06/1 +Notes: + carnil> Introduced in 3.2-rc1 with f6fb8f100b807378fda19e83e5ac6828b638603a + bwh> But AF_PACKET is only usable with CAP_NET_RAW, so is not so serious a + bwh> vulnerability without unprivileged user namespaces enabled. +Bugs: +upstream: released (4.9-rc8) [84ac7260236a49c79eede91617700174c2c19b0c] +3.16-upstream-stable: released (3.16.40) [packet-fix-race-condition-in-packet_set_ring.patch] +3.2-upstream-stable: released (3.2.85) [packet-fix-race-condition-in-packet_set_ring.patch] +sid: released (4.8.15-1) +3.16-jessie-security: released (3.16.39-1) [bugfix/all/packet-fix-race-condition-in-packet_set_ring.patch] +3.2-wheezy-security: released (3.2.84-1) [bugfix/all/packet-fix-race-condition-in-packet_set_ring.patch] |