diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2015-08-07 13:54:48 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2015-08-07 13:54:48 +0000 |
commit | dceec109da1809bc3983df8e0d97916c1a34791d (patch) | |
tree | 7eb7ab7cc2f6e463acb7c7aa5f0d4af26a0ff720 /retired | |
parent | 40fb5eb6e97df417584616fae193f2061d2706a2 (diff) |
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3895 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r-- | retired/CVE-2015-4700 | 14 | ||||
-rw-r--r-- | retired/CVE-2015-5706 | 12 |
2 files changed, 26 insertions, 0 deletions
diff --git a/retired/CVE-2015-4700 b/retired/CVE-2015-4700 new file mode 100644 index 00000000..4fe7ee19 --- /dev/null +++ b/retired/CVE-2015-4700 @@ -0,0 +1,14 @@ +Description: Crafted BPF filters may crash kernel during JIT optimisation +References: +Notes: Introduced in 0a14842f5a3c0e88a1e59fac5c3025db39721f74. + This is mitigated by the fact that BPF JIT has always been disabled by + default. +Bugs: +upstream: released (v4.1-rc6) [3f7352bf21f8fd7ba3e2fcef9488756f188e12be] +3.16-upstream-stable: released (3.16.7-ckt13) +3.2-upstream-stable: released (3.2.70) [x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch] +2.6.32-upstream-stable: N/A "Introduced in 3.0 with 0a14842f5a3c0e88a1e59fac5c3025db39721f74" +sid: released (4.0.7-1) +3.16-jessie-security: released (3.16.7-ckt11+deb8u3) [bugfix/x86/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch] +3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/x86/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch] +2.6.32-squeeze-security: N/A "Introduced in 3.0 with 0a14842f5a3c0e88a1e59fac5c3025db39721f74" diff --git a/retired/CVE-2015-5706 b/retired/CVE-2015-5706 new file mode 100644 index 00000000..753ada56 --- /dev/null +++ b/retired/CVE-2015-5706 @@ -0,0 +1,12 @@ +Description: Use-after-free in path lookup +References: +Notes: +Bugs: +upstream: released (v4.1-rc3) [f15133df088ecadd141ea1907f2c96df67c729f0] +3.16-upstream-stable: released (v3.16.7-ckt12) [bedf03d0b88d] +3.2-upstream-stable: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e" +2.6.32-upstream-stable: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e" +sid: released (4.0.4-1) +3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/path_openat-fix-double-fput.patch] +3.2-wheezy-security: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e" +2.6.32-squeeze-security: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e" |