From c77a05b32b2f63a5cefb610c25affbe3a5afe807 Mon Sep 17 00:00:00 2001 From: Ben Hutchings Date: Thu, 23 Feb 2017 21:55:28 +0000 Subject: Retire many issues now released (or N/A or ignored) in all branches git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@5001 e094ebfe-e918-0410-adfb-c712417f3574 --- retired/CVE-2016-9178 | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 retired/CVE-2016-9178 (limited to 'retired/CVE-2016-9178') diff --git a/retired/CVE-2016-9178 b/retired/CVE-2016-9178 new file mode 100644 index 00000000..54181c77 --- /dev/null +++ b/retired/CVE-2016-9178 @@ -0,0 +1,17 @@ +Description: minor information leak in get_user_ex() +References: +Notes: + carnil> If this issue is fixed, then one needs to assure + carnil> to not introduce the privilege escalation issue + carnil> as present in 4.4.22 through 4.4.28 (cf. + carnil> CVE-2016-9644) due to a wrong backport/missing + carnil> backport of 548acf19234dbda5a52d5a8e7e205af46e9da840 + carnil> as well. See notes in CVE-2016-9644 + jmm> Linus prepared a backport for 4.4.31: dc1555e670c373bfa4ca2e1e2f839d5fe2b4501a +Bugs: +upstream: released (4.8-rc7) [1c109fabbd51863475cd12ac206bdd249aee35af] +3.16-upstream-stable: released (3.16.40) [fix-potential-infoleak-in-older-kernels.patch] +3.2-upstream-stable: released (3.2.85) [fix-potential-infoleak-in-older-kernels.patch] +sid: released (4.7.5-1) +3.16-jessie-security: released (3.16.39-1) [bugfix/x86/fix-potential-infoleak-in-older-kernels.patch] +3.2-wheezy-security: released (3.2.84-1) [bugfix/x86/fix-potential-infoleak-in-older-kernels.patch] -- cgit v1.2.3