diff options
author | Sona Sarmadi <sona.sarmadi@enea.com> | 2016-01-21 13:14:31 +0100 |
---|---|---|
committer | Tudor Florea <tudor.florea@enea.com> | 2016-01-22 03:17:52 +0100 |
commit | e568d65e41f3fde7db8a8aab60ac7e750ea73325 (patch) | |
tree | 576d79c9bb0eb91190942587faf8da6c0bdb4c82 /recipes-kernel/linux/linux-hierofalcon-4.1/md-CVE-2015-5697.patch | |
parent | ac8af89d18d9ea12747354bbb8f34dc04c6613e9 (diff) | |
download | meta-hierofalcon-e568d65e41f3fde7db8a8aab60ac7e750ea73325.tar.gz |
security-keys: CVE-2016-0728
Fixes possible use-after-free vulnerability in keyring facility.
Introduced by:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/
?id=3a50597de8635cd05133bd12c95681c82fe7b878
References:
http://perception-point.io/2016/01/14/analysis-and-exploitation-of-
a-linux-kernel-vulnerability-cve-2016-0728/
https://bugzilla.redhat.com/show_bug.cgi?id=1297475
Red Hat KCS article:
https://access.redhat.com/articles/2131021
Patch is taken from:
https://bugzilla.redhat.com/attachment.cgi?id=1116563
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Signed-off-by: Tudor Florea <tudor.florea@enea.com>
Diffstat (limited to 'recipes-kernel/linux/linux-hierofalcon-4.1/md-CVE-2015-5697.patch')
0 files changed, 0 insertions, 0 deletions