[kernel-sec-discuss] r4600 - active
Ben Hutchings
benh at moszumanska.debian.org
Sat Aug 27 22:26:06 UTC 2016
Author: benh
Date: 2016-08-27 22:26:06 +0000 (Sat, 27 Aug 2016)
New Revision: 4600
Modified:
active/CVE-2016-6828
Log:
Update status of CVE-2016-6828 and add reference to commit
Modified: active/CVE-2016-6828
===================================================================
--- active/CVE-2016-6828 2016-08-26 19:59:35 UTC (rev 4599)
+++ active/CVE-2016-6828 2016-08-27 22:26:06 UTC (rev 4600)
@@ -1,11 +1,13 @@
Description: Linux tcp_xmit_retransmit_queue use after free
References:
http://www.openwall.com/lists/oss-security/2016/08/15/1
+ https://www.spinics.net/lists/netdev/msg390257.html
+ https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit?id=bb1fceca22492109be12640d49f5ea5a544c6bb4
Notes:
Bugs:
-upstream:
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid:
-3.16-jessie-security:
-3.2-wheezy-security:
+upstream: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
+sid: pending (4.7.2-1) [bugfix/all/tcp-fix-use-after-free-in-tcp_xmit_retransmit_queue.patch]
+3.16-jessie-security: needed
+3.2-wheezy-security: needed
More information about the kernel-sec-discuss
mailing list