Fix CVE-2016-2841, CVE-2016-2857, CVE-2016-2858
commitaeae754bb16e15339a13886028f983dd7a78ceaf
authorWolfgang Bumiller <w.bumiller@proxmox.com>
Mon, 7 Mar 2016 10:07:17 +0000 (7 11:07 +0100)
committerDietmar Maurer <dietmar@proxmox.com>
Mon, 7 Mar 2016 16:08:01 +0000 (7 17:08 +0100)
treefcedcf2a06c47d26c6838ba424c07ef902829570
parentfe34159215cee282685098f038073275908dbb49
Fix CVE-2016-2841, CVE-2016-2857, CVE-2016-2858

CVE-2016-2841: net: ne2000: check ring buffer control registers
CVE-2016-2857: net: check packet payload length
CVE-2016-2858: rng: add request queue support to rng-random
debian/patches/extra/0001-rng-remove-the-unused-request-cancellation-code.patch [new file with mode: 0644]
debian/patches/extra/0002-rng-move-request-queue-from-RngEgd-to-RngBackend.patch [new file with mode: 0644]
debian/patches/extra/0003-rng-move-request-queue-cleanup-from-RngEgd-to-RngBac.patch [new file with mode: 0644]
debian/patches/extra/0005-virtio-rng-ask-for-more-data-if-queue-is-not-fully-d.patch [new file with mode: 0644]
debian/patches/extra/CVE-2016-2841-net-ne2000-check-ring-buffer-control-registers.patch [new file with mode: 0644]
debian/patches/extra/CVE-2016-2857-net-check-packet-payload-length.patch [new file with mode: 0644]
debian/patches/extra/CVE-2016-2858-0004-rng-add-request-queue-support-to-rng-random.patch [new file with mode: 0644]
debian/patches/series