[kernel-sec-discuss] r3252 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed Mar 5 06:26:33 UTC 2014


Author: jmm
Date: 2014-03-05 06:25:30 +0000 (Wed, 05 Mar 2014)
New Revision: 3252

Added:
   active/CVE-2014-0100
Log:
new ipv4 issue


Added: active/CVE-2014-0100
===================================================================
--- active/CVE-2014-0100	                        (rev 0)
+++ active/CVE-2014-0100	2014-03-05 06:25:30 UTC (rev 3252)
@@ -0,0 +1,11 @@
+Description: inet frag code race condition leading to user-after-free
+References:
+ http://patchwork.ozlabs.org/patch/325844/
+Notes:
+Bugs:
+upstream: needed
+2.6.32-upstream-stable: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
+sid: needed
+3.2-wheezy-security: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
+2.6.32-squeeze-security: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
+3.2-upstream-stable: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"




More information about the kernel-sec-discuss mailing list