summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2013-7446
blob: 55e818e0ddfb3752f92a26e75fa8833537d7a77b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Description: Unix sockets use after free - peer_wait_queue prematurely freed
References:
 - https://bugzilla.redhat.com/show_bug.cgi?id=1282688
 - http://www.openwall.com/lists/oss-security/2015/11/18/9
 - https://patchwork.ozlabs.org/patch/547061/
Notes:
 bwh> Patch claims this was introduced by commit ec0d215f9420, i.e. Linux 2.6.26
Bugs:
upstream: released (4.4-rc4) [7d267278a9ece963d77eefec61630223fce08c6c]
3.16-upstream-stable: released (3.16.7-ckt22)
3.2-upstream-stable: released (3.2.75) [unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
2.6.32-upstream-stable: released (2.6.32.70)
sid: released (4.2.6-2) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
3.16-jessie-security: released (3.16.7-ckt20-1+deb8u1) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
3.2-wheezy-security: released (3.2.73-2+deb7u1) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
2.6.32-squeeze-security: released (2.6.32-48squeeze17) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy