summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2016-8399
blob: 1809fffd33e92d50a1cf719e96fb1da57c974914 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
Description: net: ping: check minimum size on ICMP header length
References:
Notes:
 bwh> Access to ping sockets is limited to a range of groups, defaulting
 bwh> to an empty range.  As Debian's ping still uses raw sockets, we
 bwh> don't change that default and this is not exploitable.
Bugs:
upstream: released (4.9) [0eab121ef8750a5c8637d51534d5e9143fb0633f]
3.16-upstream-stable: released (3.16.40) [net-ping-check-minimum-size-on-icmp-header-length.patch]
3.2-upstream-stable: released (3.2.85) [net-ping-check-minimum-size-on-icmp-header-length.patch]
sid: released (4.8.15-1)
3.16-jessie-security: released (3.16.39-1) [bugfix/all/net-ping-check-minimum-size-on-icmp-header-length.patch]
3.2-wheezy-security: released (3.2.84-1) [bugfix/all/net-ping-check-minimum-size-on-icmp-header-length.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy