summaryrefslogtreecommitdiffstats
path: root/patches/cve/CVE-2019-11478-tcp-tcp_fragment-should-apply-sane-memory-limits.patch
diff options
context:
space:
mode:
authorAndreas Wellving <andreas.wellving@enea.com>2019-07-10 10:34:19 +0200
committerAdrian Stratulat <adrian.stratulat@enea.com>2019-07-12 14:08:02 +0200
commit3250015618781f92395eed977f46421d9845c7db (patch)
tree55157886eea1eb033d8b71560356e334fde5f7f4 /patches/cve/CVE-2019-11478-tcp-tcp_fragment-should-apply-sane-memory-limits.patch
parent7f8ead2e22d6a65e5832b19d93771b5801bd0736 (diff)
downloadenea-kernel-cache-3250015618781f92395eed977f46421d9845c7db.tar.gz
net: CVE-2019-11815
net: rds: force to destroy connection if t_sock is NULL in rds_tcp_kill_sock(). References: https://nvd.nist.gov/vuln/detail/CVE-2019-11815 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-4.9.y&id=a1aa69beac4d88dfb892a95ee04fe6f932803952 Change-Id: I066682d42aa9bcdc4019befae14c9930e8a34280 Signed-off-by: Andreas Wellving <andreas.wellving@enea.com>
Diffstat (limited to 'patches/cve/CVE-2019-11478-tcp-tcp_fragment-should-apply-sane-memory-limits.patch')
0 files changed, 0 insertions, 0 deletions