summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2016-6156
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2016-09-04 17:14:01 +0000
committerSalvatore Bonaccorso <carnil@debian.org>2016-09-04 17:14:01 +0000
commit71b94564ea973dd8461334bf9e777bf3af1391b9 (patch)
tree4d34f07e671e40713bea9b3f72456fa836b6f79f /retired/CVE-2016-6156
parentaccb192b97f8661613eaaba06da3783282a5bef3 (diff)
Retiire some CVEs
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4618 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2016-6156')
-rw-r--r--retired/CVE-2016-615614
1 files changed, 14 insertions, 0 deletions
diff --git a/retired/CVE-2016-6156 b/retired/CVE-2016-6156
new file mode 100644
index 00000000..5ae818c2
--- /dev/null
+++ b/retired/CVE-2016-6156
@@ -0,0 +1,14 @@
+Description:
+References:
+Notes:
+ carnil> As far I can see the vulnerable code is present in 4.6.3
+ carnil> but the CROS_EC_CHARDEV is not enabled in Debian builds.
+ bwh> It's fixed in 4.6.6 anyway, whether or not it matters to Debian
+Bugs:
+ https://bugzilla.kernel.org/show_bug.cgi?id=120131
+upstream: released (4.7-rc7) [096cdc6f52225835ff503f987a0d68ef770bb78e]
+3.16-upstream-stable: N/A "Introduced in 4.2-rc1 with a841178445bb72a3d566b4e6ab9d19e9b002eb47"
+3.2-upstream-stable: N/A "Introduced in 4.2-rc1 with a841178445bb72a3d566b4e6ab9d19e9b002eb47"
+sid: released (4.7.2-1)
+3.16-jessie-security: N/A "Vulnerable code not present"
+3.2-wheezy-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy