summaryrefslogtreecommitdiffstats
path: root/retired
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2014-12-05 16:12:58 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2014-12-05 16:12:58 +0000
commit3ec1af233e43d7a7aaa625a8785a80dcde8d52df (patch)
tree99e2d99f1f467ca78fb770099e274d7776f57386 /retired
parent5bd5dd4448215d5dc724e18924f09f0bd9c1fa8c (diff)
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3593 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r--retired/CVE-2010-531313
-rw-r--r--retired/CVE-2014-318312
-rw-r--r--retired/CVE-2014-353511
-rw-r--r--retired/CVE-2014-361011
-rw-r--r--retired/CVE-2014-361111
-rw-r--r--retired/CVE-2014-364511
-rw-r--r--retired/CVE-2014-364711
-rw-r--r--retired/CVE-2014-369012
-rw-r--r--retired/CVE-2014-784213
9 files changed, 105 insertions, 0 deletions
diff --git a/retired/CVE-2010-5313 b/retired/CVE-2010-5313
new file mode 100644
index 00000000..07c99d6c
--- /dev/null
+++ b/retired/CVE-2010-5313
@@ -0,0 +1,13 @@
+Description: kvm: reporting emulation failures to userspace
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1163762
+Notes:
+ relaed to CVE-2014-7842
+Bugs:
+upstream: released (2.6.38) [fc3a9157d3148ab91039c75423da8ef97be3e105]
+2.6.32-upstream-stable: ignored
+sid: released (2.6.38-1)
+3.2-wheezy-security: N/A
+2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
+3.16-upstream-stable: released (3.16.7-ckt2)
+3.2-upstream-stable: N/A
diff --git a/retired/CVE-2014-3183 b/retired/CVE-2014-3183
new file mode 100644
index 00000000..b7d7d840
--- /dev/null
+++ b/retired/CVE-2014-3183
@@ -0,0 +1,12 @@
+Description:
+References:
+ https://code.google.com/p/google-security-research/issues/detail?id=90
+Notes:
+Bugs:
+upstream: released (3.17-rc2) [6817ae225cd650fb1c3295d769298c38b1eba818]
+2.6.32-upstream-stable: N/A "Vulnerable code not present"
+sid: released (3.16.2-2)
+3.2-wheezy-security: released (3.2.63-1)
+2.6.32-squeeze-security: N/A "Vulnerable code not present"
+3.16-upstream-stable: released (3.16.2)
+3.2-upstream-stable: released (3.2.63)
diff --git a/retired/CVE-2014-3535 b/retired/CVE-2014-3535
new file mode 100644
index 00000000..aa803738
--- /dev/null
+++ b/retired/CVE-2014-3535
@@ -0,0 +1,11 @@
+Description: NULL deref in logging VxLAN packets
+References:
+Notes:
+Bugs:
+upstream: released (2.6.36) [256df2f3879efdb2e9808bdb1b54b16fbb11fa38]
+2.6.32-upstream-stable: N/A "Introduced in 2.6.34 with b3d95c5c93d4b57eaea0ad3f582b08a6b5fb3eb1"
+sid: released (2.6.36-1)
+3.2-wheezy-security: N/A
+3.16-upstream-stable: N/A
+2.6.32-squeeze-security: N/A "Introduced in 2.6.34 with b3d95c5c93d4b57eaea0ad3f582b08a6b5fb3eb1"
+3.2-upstream-stable: N/A
diff --git a/retired/CVE-2014-3610 b/retired/CVE-2014-3610
new file mode 100644
index 00000000..f7806e4d
--- /dev/null
+++ b/retired/CVE-2014-3610
@@ -0,0 +1,11 @@
+Description:
+References:
+Notes:
+Bugs:
+upstream: released (3.18-rc2) [854e8bb1aa06c578c2c9145fa6bfe3680ef63b23, 8b3c3104c3f4f706e99365c3e0d2aa61b95f969f]
+2.6.32-upstream-stable: ignored
+sid: released (3.16.7-1) [bugfix/x86/KVM-x86-Check-non-canonical-addresses-upon-WRMSR.patch, bugfix/x86/KVM-x86-Prevent-host-from-panicking-on-shared-MSR-wr.patch]
+3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/x86/KVM-x86-Check-non-canonical-addresses-upon-WRMSR.patch]
+2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
+3.16-upstream-stable: released (3.16.7-ckt1)
+3.2-upstream-stable: released (3.2.64)
diff --git a/retired/CVE-2014-3611 b/retired/CVE-2014-3611
new file mode 100644
index 00000000..88502264
--- /dev/null
+++ b/retired/CVE-2014-3611
@@ -0,0 +1,11 @@
+Description:
+References:
+Notes:
+Bugs:
+upstream: released (3.18-rc2) [2febc839133280d5a5e8e1179c94ea674489dae2]
+2.6.32-upstream-stable: ignored
+sid: released (3.16.7-1) [bugfix/x86/KVM-x86-Improve-thread-safety-in-pit.patch]
+3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/x86/KVM-x86-Improve-thread-safety-in-pit.patch]
+2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
+3.16-upstream-stable: released (3.16.7-ckt1)
+3.2-upstream-stable: released (3.2.64)
diff --git a/retired/CVE-2014-3645 b/retired/CVE-2014-3645
new file mode 100644
index 00000000..17255a0a
--- /dev/null
+++ b/retired/CVE-2014-3645
@@ -0,0 +1,11 @@
+Description:
+References:
+Notes:
+Bugs:
+upstream: released (3.12) [bfd0a56b90005f8c8a004baf407ad90045c2b11e]
+2.6.32-upstream-stable: ignored
+sid: released (3.12-1)
+3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/x86/nEPT-Nested-INVEPT.patch]
+2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
+3.16-upstream-stable: N/A
+3.2-upstream-stable: released (3.2.64)
diff --git a/retired/CVE-2014-3647 b/retired/CVE-2014-3647
new file mode 100644
index 00000000..abfdd23b
--- /dev/null
+++ b/retired/CVE-2014-3647
@@ -0,0 +1,11 @@
+Description:
+References:
+Notes:
+Bugs:
+upstream: released (3.18-rc2) [234f3ce485d54017f15cf5e0699cff4100121601, d1442d85cc30ea75f7d399474ca738e0bc96f715]
+2.6.32-upstream-stable: ignored
+sid: released (3.16.7-1) [bugfix/x86/KVM-x86-Fix-wrong-masking-on-relative-jump-call.patch, bugfix/x86/KVM-x86-Emulator-fixes-for-eip-canonical-checks-on-n.patch, bugfix/x86/KVM-x86-Handle-errors-when-RIP-is-set-during-far-jum.patch]
+3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/x86/KVM-x86-emulator-Use-opcode-execute-for-CALL.patch, bugfix/x86/KVM-x86-Fix-wrong-masking-on-relative-jump-call.patch, bugfix/x86/KVM-x86-Emulator-fixes-for-eip-canonical-checks-on-n.patch, bugfix/x86/KVM-x86-use-new-CS.RPL-as-CPL-during-task-switch.patch, bugfix/x86/KVM-x86-Handle-errors-when-RIP-is-set-during-far-jum.patch]
+2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
+3.16-upstream-stable: released (3.16.7-ckt1)
+3.2-upstream-stable: released (3.2.64)
diff --git a/retired/CVE-2014-3690 b/retired/CVE-2014-3690
new file mode 100644
index 00000000..c64f96c3
--- /dev/null
+++ b/retired/CVE-2014-3690
@@ -0,0 +1,12 @@
+Description: [kvm DoS]
+References:
+ http://seclists.org/oss-sec/2014/q4/416
+Notes:
+Bugs:
+upstream: released (3.18-rc1) [d974baa398f34393db76be45f7d4d04fbdbb4a0a]
+2.6.32-upstream-stable: ignored
+sid: released (3.16.7-1)
+3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/x86/x86-kvm-vmx-Preserve-CR4-across-VM-entry.patch]
+2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
+3.16-upstream-stable: released (3.16.7)
+3.2-upstream-stable: released (3.2.64)
diff --git a/retired/CVE-2014-7842 b/retired/CVE-2014-7842
new file mode 100644
index 00000000..d1e6f9fd
--- /dev/null
+++ b/retired/CVE-2014-7842
@@ -0,0 +1,13 @@
+Description: kvm: reporting emulation failures to userspace
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1163762
+Notes:
+ related to CVE-2010-5313
+Bugs:
+upstream: released (3.18-rc1) [a2b9e6c1a35afcc0973acb72e591c714e78885ff]
+2.6.32-upstream-stable: ignored
+sid: needed
+3.2-wheezy-security:
+2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
+3.16-upstream-stable: released (3.16.7-ckt2)
+3.2-upstream-stable:

© 2014-2024 Faster IT GmbH | imprint | privacy policy