Author: benh
Date: 2016-12-16 16:35:55 +0000 (Fri, 16 Dec 2016)
New Revision: 47137

Modified:
   data/CVE/list
Log:
Triage CVE-2016-8655

It's much less serious without unprivileged user namespaces enabled,
and that isn't even an option in wheezy.


Modified: data/CVE/list
===================================================================
--- data/CVE/list       2016-12-16 14:44:14 UTC (rev 47136)
+++ data/CVE/list       2016-12-16 16:35:55 UTC (rev 47137)
@@ -11154,10 +11154,11 @@
        NOT-FOR-US: Red Hat JBoss; jbossas init script
 CVE-2016-8655 (Race condition in net/packet/af_packet.c in the Linux kernel 
through ...)
        - linux <unfixed>
+       [wheezy] - linux <no-dsa> (Minor issue)
        NOTE: http://seclists.org/oss-sec/2016/q4/607
        NOTE: Introduced by: 
https://git.kernel.org/linus/f6fb8f100b807378fda19e83e5ac6828b638603a (v3.2-rc1)
        NOTE: Fixed by: 
https://git.kernel.org/linus/84ac7260236a49c79eede91617700174c2c19b0c (v4.9-rc8)
-       NOTE: Non-privileged user namespaces disabled by default, only 
vulnerable with sysctl kernel.unprivileged_userns_clone=1
+       NOTE: Non-privileged user namespaces disabled by default, only 
exploitable by arbitrary user if sysctl kernel.unprivileged_userns_clone=1
 CVE-2016-8654 [Heap-based buffer overflow in QMFB code in JPC codec]
        RESERVED
        {DLA-739-1}


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to