[kernel-sec-discuss] r4600 - active

Ben Hutchings benh at moszumanska.debian.org
Sat Aug 27 22:26:06 UTC 2016


Author: benh
Date: 2016-08-27 22:26:06 +0000 (Sat, 27 Aug 2016)
New Revision: 4600

Modified:
   active/CVE-2016-6828
Log:
Update status of CVE-2016-6828 and add reference to commit

Modified: active/CVE-2016-6828
===================================================================
--- active/CVE-2016-6828	2016-08-26 19:59:35 UTC (rev 4599)
+++ active/CVE-2016-6828	2016-08-27 22:26:06 UTC (rev 4600)
@@ -1,11 +1,13 @@
 Description: Linux tcp_xmit_retransmit_queue use after free
 References:
  http://www.openwall.com/lists/oss-security/2016/08/15/1
+ https://www.spinics.net/lists/netdev/msg390257.html
+ https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit?id=bb1fceca22492109be12640d49f5ea5a544c6bb4
 Notes:
 Bugs:
-upstream:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
+sid: pending (4.7.2-1) [bugfix/all/tcp-fix-use-after-free-in-tcp_xmit_retransmit_queue.patch]
+3.16-jessie-security: needed
+3.2-wheezy-security: needed




More information about the kernel-sec-discuss mailing list