From bedf1a9077c7bfcb19e94f8f3f4a4b27d8c14e54 Mon Sep 17 00:00:00 2001 From: Moritz Muehlenhoff Date: Mon, 11 May 2015 07:06:16 +0000 Subject: retire git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3779 e094ebfe-e918-0410-adfb-c712417f3574 --- retired/CVE-2015-1593 | 15 +++++++++++++++ 1 file changed, 15 insertions(+) create mode 100644 retired/CVE-2015-1593 (limited to 'retired/CVE-2015-1593') diff --git a/retired/CVE-2015-1593 b/retired/CVE-2015-1593 new file mode 100644 index 00000000..0b16fc32 --- /dev/null +++ b/retired/CVE-2015-1593 @@ -0,0 +1,15 @@ +Description: Linux stack ASLR implementation integer overflow +References: + http://hmarco.org/bugs/linux-ASLR-integer-overflow.html + https://lkml.org/lkml/2015/1/7/811 + http://article.gmane.org/gmane.linux.kernel/1888210 +Notes: +Bugs: +upstream: released (4.0-rc1) [4e7c22d447bb6d7e37bfe39ff658486ae78e8d77] +2.6.32-upstream-stable: pending (2.6.32.66) +sid: released (3.16.7-ckt7-1) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch] +3.16-jessie-security: N/A "Fixed before initial release" +3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch] +2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch] +3.16-upstream-stable: released (3.16.7-ckt8) +3.2-upstream-stable: released (3.2.69) [x86-mm-aslr-fix-stack-randomization-on-64-bit-systems.patch] -- cgit v1.2.3