diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2019-09-03 10:19:54 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2019-09-03 10:19:54 +0200 |
commit | a85cb38e1dbd5fc055625ff00cfb3418d5708e2f (patch) | |
tree | 53e2444a9e0b8086598b0923bfcea466b440d41d /active/CVE-2019-0136 | |
parent | e85573329bc70f53e990a7b135b3baa816365bd0 (diff) |
Update information for CVE-2019-0136
Diffstat (limited to 'active/CVE-2019-0136')
-rw-r--r-- | active/CVE-2019-0136 | 9 |
1 files changed, 6 insertions, 3 deletions
diff --git a/active/CVE-2019-0136 b/active/CVE-2019-0136 index 0d0c0e0a3..3eb8b97fb 100644 --- a/active/CVE-2019-0136 +++ b/active/CVE-2019-0136 @@ -2,12 +2,15 @@ Description: Insufficient access control in the Intel(R) PROSet/Wireless WiFi So References: https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-0136.html Notes: + carnil> the second commit 79c92ca42b5a ("mac80211: handle + carnil> deauthentication/disassociation from TDLS peer") is not applied + carnil> to older branches and might need investigation if applicable. Bugs: upstream: released (v5.2-rc6) [588f7d39b3592a36fb7702ae3b8bdd9be4621e2f, 79c92ca42b5a3e0ea172ea2ce8df8e125af237da] -4.19-upstream-stable: -4.9-upstream-stable: +4.19-upstream-stable: released (4.9.56) [0e879ef1cb5baddebe1f12a9a3940a87d8e61558, 1e1007ac47d85dacf6d45821a2870b6268499700] +4.9-upstream-stable: released (4.9.185) [9f0f5ff93ed0205a90f11103e9937f3c0417cd4b] 3.16-upstream-stable: -sid: +sid: released (5.2.6-1) 4.19-buster-security: 4.9-stretch-security: 3.16-jessie-security: |