Overview
Request 355040 accepted
- KEYS: Fix race between read and revoke (bnc#958951,
CVE-2015-7550).
- commit 60aea17
- patches.fixes/keys-fix-leak.patch: (bnc#962075, CVE-2016-0728).
- commit 5824983
- sctp: Prevent soft lockup when sctp_accept() is called during
a timeout event (CVE-2015-8767 bsc#961509).
- commit 9485403
- pptp: verify sockaddr_len in pptp_bind() and pptp_connect()
(bsc#959190, CVE-2015-8569).
- commit 32587c2
- bluetooth: Validate socket address length in sco_sock_bind()
(bsc#959399, CVE-2015-8575).
- commit 220d6d4
- Refresh
patches.fixes/net-add-validation-for-the-socket-syscall-protocol-a.patch.
Fix build error caused by missing U8_MAX.
- commit 862fda6
- net: add validation for the socket syscall protocol argument
(bsc#958886, CVE-2015-8543).
- commit 7563240
- KEYS: Make /proc/keys unconditional if CONFIG_KEYS=y
(boo#956934).
- Created by jeff_mahoney
- In state accepted
- Supersedes 355038
Request History
jeff_mahoney created request
- KEYS: Fix race between read and revoke (bnc#958951,
CVE-2015-7550).
- commit 60aea17
- patches.fixes/keys-fix-leak.patch: (bnc#962075, CVE-2016-0728).
- commit 5824983
- sctp: Prevent soft lockup when sctp_accept() is called during
a timeout event (CVE-2015-8767 bsc#961509).
- commit 9485403
- pptp: verify sockaddr_len in pptp_bind() and pptp_connect()
(bsc#959190, CVE-2015-8569).
- commit 32587c2
- bluetooth: Validate socket address length in sco_sock_bind()
(bsc#959399, CVE-2015-8575).
- commit 220d6d4
- Refresh
patches.fixes/net-add-validation-for-the-socket-syscall-protocol-a.patch.
Fix build error caused by missing U8_MAX.
- commit 862fda6
- net: add validation for the socket syscall protocol argument
(bsc#958886, CVE-2015-8543).
- commit 7563240
- KEYS: Make /proc/keys unconditional if CONFIG_KEYS=y
(boo#956934).
wrosenauer accepted request
thanks