diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2014-12-09 05:23:28 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2014-12-09 05:23:28 +0000 |
commit | 0097c40ba4c5b66fca2367c9782821f3d4de470d (patch) | |
tree | 0a6c026caf36f96dec69aec64f3d7f312e3b4dab /retired | |
parent | 5ae6fd26f64eabb877c77bfaa9022ce3a8e46d30 (diff) |
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3601 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r-- | retired/CVE-2012-6657 | 11 | ||||
-rw-r--r-- | retired/CVE-2014-3673 | 11 | ||||
-rw-r--r-- | retired/CVE-2014-4508 | 12 | ||||
-rw-r--r-- | retired/CVE-2014-4608 | 12 | ||||
-rw-r--r-- | retired/CVE-2014-5077 | 14 | ||||
-rw-r--r-- | retired/CVE-2014-5471 | 11 | ||||
-rw-r--r-- | retired/CVE-2014-5472 | 11 |
7 files changed, 82 insertions, 0 deletions
diff --git a/retired/CVE-2012-6657 b/retired/CVE-2012-6657 new file mode 100644 index 000000000..41730ebd2 --- /dev/null +++ b/retired/CVE-2012-6657 @@ -0,0 +1,11 @@ +Description: net: guard tcp_set_keepalive() to tcp sockets +References: +Notes: +Bugs: +upstream: released (3.6-1) [3e10986d1d698140747fcfc2761ec9cb64c1d582] +2.6.32-upstream-stable: released (2.6.32.61) +sid: released (3.6.4-1) +3.2-wheezy-security: released (3.2.32-1) +2.6.32-squeeze-security: released (2.6.32-48squeeze9) +3.16-upstream-stable: N/A +3.2-upstream-stable: released (3.2.31) diff --git a/retired/CVE-2014-3673 b/retired/CVE-2014-3673 new file mode 100644 index 000000000..dd245c091 --- /dev/null +++ b/retired/CVE-2014-3673 @@ -0,0 +1,11 @@ +Description: sctp: skb_over_panic when receiving malformed ASCONF chunks +References: +Notes: +Bugs: +upstream: released (v3.18-rc1) [9de7922bc709eee2f609cd01d98aaedc4cf5ea74] +2.6.32-upstream-stable: released (2.6.32.64) +sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-skb_over_panic-when-receiving-malformed.patch] +3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/all/net-sctp-fix-skb_over_panic-when-receiving-malformed.patch] +2.6.32-squeeze-security: released (2.6.32-48squeeze9) +3.16-upstream-stable: released (3.16.7-ckt1) +3.2-upstream-stable: released (3.2.64) diff --git a/retired/CVE-2014-4508 b/retired/CVE-2014-4508 new file mode 100644 index 000000000..7cd2d51e2 --- /dev/null +++ b/retired/CVE-2014-4508 @@ -0,0 +1,12 @@ +Description: audit denial of service on 32 systems +References: + https://lkml.org/lkml/2014/6/16/682 +Notes: +Bugs: +upstream: released (3.16-rc3) [554086d85e71f30abe46fc014fea31929a7c6a8a] +2.6.32-upstream-stable: released (2.6.32.64) +sid: released (3.14.9-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch] +3.2-wheezy-security: released (3.2.60-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch] +3.16-upstream-stable: N/A +2.6.32-squeeze-security: released (2.6.32-48squeeze9) +3.2-upstream-stable: released (3.2.61) [x86_32-entry-do-syscall-exit-work-on-badsys-cve-2014-4508.patch] diff --git a/retired/CVE-2014-4608 b/retired/CVE-2014-4608 new file mode 100644 index 000000000..50efd5f5b --- /dev/null +++ b/retired/CVE-2014-4608 @@ -0,0 +1,12 @@ +Description: lzo integer overflow +References: +Notes: + jmm> Not exploiable according to http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html +Bugs: +upstream: released (3.16-rc3) [206a81c18401c0cde6e579164f752c4b147324ce] +2.6.32-upstream-stable: released (2.6.32.64) +sid: released (3.14.9-1) +3.2-wheezy-security: released (3.2.63-1) +3.16-upstream-stable: N/A +2.6.32-squeeze-security: released (2.6.32-48squeeze9) +3.2-upstream-stable: released (3.2.61) [lib-lzo-rename-lzo1x_decompress.c-to-lzo1x_decompress_safe.c.patch, lib-lzo-update-lzo-compression-to-current-upstream-version.patch, lzo-properly-check-for-overruns.patch] diff --git a/retired/CVE-2014-5077 b/retired/CVE-2014-5077 new file mode 100644 index 000000000..732de319a --- /dev/null +++ b/retired/CVE-2014-5077 @@ -0,0 +1,14 @@ +Description: SCTP remote denial of service +References: + http://patchwork.ozlabs.org/patch/372475/ +Notes: + bwh> Commit message says bug has been present since commit 730fc3d05cd4 + bwh> ('[SCTP]: Implete SCTP-AUTH parameter processing') i.e. in 2.6.24. +Bugs: +upstream: released (3.16) [1be9a950c646c9092fb3618197f7b6bfb50e82aa] +2.6.32-upstream-stable: released (2.6.32.64) +sid: released (3.14.15-1) [bugfix/all/net-sctp-inherit-auth_capable-on-INIT-collisions.patch] +3.2-wheezy-security: released (3.2.63-1) +3.16-upstream-stable: N/A +2.6.32-squeeze-security: released (2.6.32-48squeeze9) +3.2-upstream-stable: released (3.2.63) [net-sctp-inherit-auth_capable-on-init-collisions.patch] diff --git a/retired/CVE-2014-5471 b/retired/CVE-2014-5471 new file mode 100644 index 000000000..a18396a42 --- /dev/null +++ b/retired/CVE-2014-5471 @@ -0,0 +1,11 @@ +Description: unbound recursion in ISOFS - crashes / reboots a kernel due to kernel stack overflow / corruption +References: +Notes: +Bugs: +upstream: released (v3.17-rc2) [410dd3cf4c9b36f27ed4542ee18b1af5e68645a4] +2.6.32-upstream-stable: released (2.6.32.64) +sid: released (3.16.2-2) +3.2-wheezy-security: released (3.2.63-1) +2.6.32-squeeze-security: released (2.6.32-48squeeze9) +3.16-upstream-stable: released (3.16.2) +3.2-upstream-stable: released (3.2.63) [isofs-fix-unbounded-recursion-when-processing-relocated-directories.patch] diff --git a/retired/CVE-2014-5472 b/retired/CVE-2014-5472 new file mode 100644 index 000000000..1cfa34fc1 --- /dev/null +++ b/retired/CVE-2014-5472 @@ -0,0 +1,11 @@ +Description: unbound recursion in ISOFS - causes a deadlock in the mount process in "inode_wait" +References: +Notes: +Bugs: +upstream: released (v3.17-rc2) [410dd3cf4c9b36f27ed4542ee18b1af5e68645a4] +2.6.32-upstream-stable: released (2.6.32.64) +sid: released (3.16.2-2) +3.2-wheezy-security: released (3.2.63-1) +2.6.32-squeeze-security: released (2.6.32-48squeeze9) +3.16-upstream-stable: released (3.16.2) +3.2-upstream-stable: released (3.2.63) [isofs-fix-unbounded-recursion-when-processing-relocated-directories.patch] |