summaryrefslogtreecommitdiffstats
path: root/active/CVE-2019-0136
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2019-09-03 10:19:54 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2019-09-03 10:19:54 +0200
commita85cb38e1dbd5fc055625ff00cfb3418d5708e2f (patch)
tree53e2444a9e0b8086598b0923bfcea466b440d41d /active/CVE-2019-0136
parente85573329bc70f53e990a7b135b3baa816365bd0 (diff)
Update information for CVE-2019-0136
Diffstat (limited to 'active/CVE-2019-0136')
-rw-r--r--active/CVE-2019-01369
1 files changed, 6 insertions, 3 deletions
diff --git a/active/CVE-2019-0136 b/active/CVE-2019-0136
index 0d0c0e0a3..3eb8b97fb 100644
--- a/active/CVE-2019-0136
+++ b/active/CVE-2019-0136
@@ -2,12 +2,15 @@ Description: Insufficient access control in the Intel(R) PROSet/Wireless WiFi So
References:
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-0136.html
Notes:
+ carnil> the second commit 79c92ca42b5a ("mac80211: handle
+ carnil> deauthentication/disassociation from TDLS peer") is not applied
+ carnil> to older branches and might need investigation if applicable.
Bugs:
upstream: released (v5.2-rc6) [588f7d39b3592a36fb7702ae3b8bdd9be4621e2f, 79c92ca42b5a3e0ea172ea2ce8df8e125af237da]
-4.19-upstream-stable:
-4.9-upstream-stable:
+4.19-upstream-stable: released (4.9.56) [0e879ef1cb5baddebe1f12a9a3940a87d8e61558, 1e1007ac47d85dacf6d45821a2870b6268499700]
+4.9-upstream-stable: released (4.9.185) [9f0f5ff93ed0205a90f11103e9937f3c0417cd4b]
3.16-upstream-stable:
-sid:
+sid: released (5.2.6-1)
4.19-buster-security:
4.9-stretch-security:
3.16-jessie-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy