blob: 81c00015396a684d0449aefb0e37cdf574cfa106 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
|
Description: unix: properly account for FDs passed over unix sockets
References:
https://lkml.org/lkml/2015/12/31/15
Notes:
carnil> 712f4aad406bb1ed67f3f98d04c044191f0ff593 according to the commit
carnil> message mitigated the issue.
bwh> This was applied in 3.16.7-ckt20-1+deb8u3, 4.3.3-6, and 4.3.5.
carnil> There is a second commit [759c01142a5d0f364a462346168a56de28a80f52] to
carnil> mitigate CVE-2013-4312, but this is slightly more involving. Ben
carnil> suggested to wait before starting to backport this as well and look
carnil> for possible regressions/problems.
Bugs:
https://bugzilla.kernel.org/show_bug.cgi?id=20402
upstream: released (4.5-rc1) [712f4aad406bb1ed67f3f98d04c044191f0ff593]
3.16-upstream-stable: released (3.16.7-ckt24)
3.2-upstream-stable: released (3.2.78) [a5a6cf8c405e826ff7ed1308dde72560c0ed4854]
2.6.32-upstream-stable: ignored
sid: released (4.3.3-6) [bugfix/all/unix-properly-account-for-FDs-passed-over-unix-socke.patch]
3.16-jessie-security: released (3.16.7-ckt20-1+deb8u3) [bugfix/all/unix-properly-account-for-FDs-passed-over-unix-socke.patch]
3.2-wheezy-security: released (3.2.73-2+deb7u3) [bugfix/all/unix-properly-account-for-FDs-passed-over-unix-socke.patch]
2.6.32-squeeze-security: ignored "Too risky to backport at EOL"
|