summaryrefslogtreecommitdiffstats
path: root/retired
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2015-02-24 15:47:33 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2015-02-24 15:47:33 +0000
commit7d1cfdb962bffefb3e1c3ae188b9f6aac088cf5d (patch)
tree8458495710db35847d9eab1fbc11a5682433a275 /retired
parentc853e5a24c8b013657a053bfd2d882285cfdfcd7 (diff)
retire (no need to wait for release of pending issues in 2.6.32.x LTS)
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3701 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r--retired/CVE-2013-688511
-rw-r--r--retired/CVE-2014-782215
-rw-r--r--retired/CVE-2014-813311
-rw-r--r--retired/CVE-2014-813414
-rw-r--r--retired/CVE-2014-816012
-rw-r--r--retired/CVE-2014-942011
-rw-r--r--retired/CVE-2014-958411
-rw-r--r--retired/CVE-2014-958512
-rw-r--r--retired/CVE-2015-142113
-rw-r--r--retired/CVE-2015-146512
10 files changed, 122 insertions, 0 deletions
diff --git a/retired/CVE-2013-6885 b/retired/CVE-2013-6885
new file mode 100644
index 00000000..77611c0a
--- /dev/null
+++ b/retired/CVE-2013-6885
@@ -0,0 +1,11 @@
+Description: AMD family 16h erratum 793, hardware lock-up
+References:
+Notes:
+Bugs:
+upstream: released (3.14-rc2) [3b56496865f9f7d9bcb2f93b44c63f274f08e3b6]
+2.6.32-upstream-stable: pending (2.6.32.66)
+sid: released (3.14.2-1)
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
+3.16-upstream-stable: N/A "fixed before 3.16"
+3.2-upstream-stable: released (3.2.67) [x86-cpu-amd-add-workaround-for-family-16h-erratum-793.patch]
diff --git a/retired/CVE-2014-7822 b/retired/CVE-2014-7822
new file mode 100644
index 00000000..ee60adab
--- /dev/null
+++ b/retired/CVE-2014-7822
@@ -0,0 +1,15 @@
+Description: splice: lack of generic write checks
+References:
+Notes:
+ bwh> I have a reproducer for this. On 2.6.32 it causes ext4 to corrupt
+ bwh> the filesystem (which is caught by e2fsck). On 3.2 it causes ext4 to
+ bwh> hang on umount. ext3 and xfs don't seem to be affected.
+Bugs:
+ - https://bugzilla.redhat.com/show_bug.cgi?id=1163792
+upstream: released (v3.16-rc1) [8d0207652cbe27d1f962050737848e5ad4671958]
+2.6.32-upstream-stable: pending (2.6.32.66)
+sid: released (3.16.2-1)
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
+3.16-upstream-stable: N/A "fixed before 3.16"
+3.2-upstream-stable: released (3.2.67) [splice-apply-generic-position-and-size-checks-to-eac.patch]
diff --git a/retired/CVE-2014-8133 b/retired/CVE-2014-8133
new file mode 100644
index 00000000..8e5f0a38
--- /dev/null
+++ b/retired/CVE-2014-8133
@@ -0,0 +1,11 @@
+Description: x86: espfix(64) bypass via set_thread_area and CLONE_SETTLS
+References:
+Notes:
+Bugs:
+upstream: released (3.19-rc1) [41bdc78544b8a93a9c6814b8bbbfef966272abbe]
+2.6.32-upstream-stable: pending (2.6.32.66)
+sid: released (3.16.7-ckt4-1)
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
+3.16-upstream-stable: released (3.16.7-ckt4)
+3.2-upstream-stable: released (3.2.66) [x86-tls-validate-tls-entries-to-protect-espfix.patch]
diff --git a/retired/CVE-2014-8134 b/retired/CVE-2014-8134
new file mode 100644
index 00000000..d37bcf1f
--- /dev/null
+++ b/retired/CVE-2014-8134
@@ -0,0 +1,14 @@
+Description: x86: espfix not working for 32-bit KVM paravirt guests
+References:
+ http://www.spinics.net/lists/kvm/msg111458.html
+ https://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?h=linux-next&id=29fa6825463c97e5157284db80107d1bfac5d77b
+Notes:
+ This is for KVM guests, not KVM itself, so it does apply to squeeze-lts.
+Bugs:
+upstream: released (3.19-rc1) [29fa6825463c97e5157284db80107d1bfac5d77b]
+2.6.32-upstream-stable: pending (2.6.32.66)
+sid: released (3.16.7-ckt4-1)
+3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
+3.16-upstream-stable: released (3.16.7-ckt4)
+3.2-upstream-stable: released (3.2.66) [x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
diff --git a/retired/CVE-2014-8160 b/retired/CVE-2014-8160
new file mode 100644
index 00000000..29df24d4
--- /dev/null
+++ b/retired/CVE-2014-8160
@@ -0,0 +1,12 @@
+Description: netfilter: SCTP firewalling fails until SCTP module is loaded
+References:
+ http://www.spinics.net/lists/netfilter-devel/msg33430.html
+Notes:
+Bugs:
+upstream: released (3.18) [db29a9508a9246e77087c5531e45b2c88ec6988b]
+2.6.32-upstream-stable: pending (2.6.32.66)
+sid: released (3.16.7-ckt4-1) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
+3.16-upstream-stable: released (3.16.7-ckt5)
+3.2-upstream-stable: released (3.2.67) [netfilter-conntrack-disable-generic-tracking-for-kno.patch]
diff --git a/retired/CVE-2014-9420 b/retired/CVE-2014-9420
new file mode 100644
index 00000000..26e47513
--- /dev/null
+++ b/retired/CVE-2014-9420
@@ -0,0 +1,11 @@
+Description: fs: isofs: infinite loop in CE records
+References:
+Notes:
+Bugs:
+upstream: released (v3.19-rc1) [f54e18f1b831c92f6512d2eedb224cd63d607d3d]
+2.6.32-upstream-stable: pending (2.6.32.66)
+sid: released (3.16.7-ckt4-1)
+3.2-wheezy-security: released (3.2.65-1) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
+3.16-upstream-stable: released (3.16.7-ckt4)
+3.2-upstream-stable: released (3.2.67) [isofs-fix-infinite-looping-over-ce-entries.patch]
diff --git a/retired/CVE-2014-9584 b/retired/CVE-2014-9584
new file mode 100644
index 00000000..6b011872
--- /dev/null
+++ b/retired/CVE-2014-9584
@@ -0,0 +1,11 @@
+Description: isofs information leak
+References:
+Notes:
+Bugs:
+upstream: released (3.19-rc3) [4e2024624e678f0ebb916e6192bd23c1f9fdf696]
+2.6.32-upstream-stable: pending (2.6.32.66)
+sid: released (3.16.7-ckt4-1)
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
+3.16-upstream-stable: released (3.16.7-ckt4)
+3.2-upstream-stable: released (3.2.67) [isofs-fix-unchecked-printing-of-er-records.patch]
diff --git a/retired/CVE-2014-9585 b/retired/CVE-2014-9585
new file mode 100644
index 00000000..4e0575b5
--- /dev/null
+++ b/retired/CVE-2014-9585
@@ -0,0 +1,12 @@
+Description: x86_64, vdso: Fix the vdso address randomization algorithm
+References:
+ https://git.kernel.org/cgit/linux/kernel/git/luto/linux.git/commit/?h=x86/vdso&id=bc3b94c31d65e761ddfe150d02932c65971b74e2
+Notes:
+Bugs:
+upstream: released (3.19-rc4) [394f56fe480140877304d342dec46d50dc823d46]
+2.6.32-upstream-stable: pending (2.6.32.66)
+sid: released (3.16.7-ckt4-1) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
+3.16-upstream-stable: released (3.16.7-ckt5)
+3.2-upstream-stable: released (3.2.67) [x86_64-vdso-fix-the-vdso-address-randomization-algorithm.patch]
diff --git a/retired/CVE-2015-1421 b/retired/CVE-2015-1421
new file mode 100644
index 00000000..292aef1b
--- /dev/null
+++ b/retired/CVE-2015-1421
@@ -0,0 +1,13 @@
+Description: Use-after-free in sctp triggered remotely
+References:
+ http://www.openwall.com/lists/oss-security/2015/01/29/13
+ https://git.kernel.org/linus/600ddd6825543962fb807884169e57b580dba208
+Notes:
+Bugs:
+upstream: released (3.19-rc7) [600ddd6825543962fb807884169e57b580dba208]
+2.6.32-upstream-stable: pending (2.6.32.66)
+sid: released (3.16.7-ckt4-3) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
+3.16-upstream-stable: released (3.16.7-ckt6)
+3.2-upstream-stable: released (3.2.67) [net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]
diff --git a/retired/CVE-2015-1465 b/retired/CVE-2015-1465
new file mode 100644
index 00000000..5389c06c
--- /dev/null
+++ b/retired/CVE-2015-1465
@@ -0,0 +1,12 @@
+Description: DoS due to routing packets to too many different dsts/too fast
+References:
+ - https://bugzilla.redhat.com/show_bug.cgi?id=1183744
+Notes:
+Bugs:
+upstream: released (v3.19-rc7) [df4d92549f23e1c037e83323aff58a21b3de7fe0]
+2.6.32-upstream-stable: N/A" "Introduced in 3.16 with f88649721268999bdff09777847080a52004f691"
+sid: pending (3.16.7-ckt6-1)
+3.2-wheezy-security: N/A" "Introduced in 3.16 with f88649721268999bdff09777847080a52004f691"
+2.6.32-squeeze-security: N/A" "Introduced in 3.16 with f88649721268999bdff09777847080a52004f691"
+3.16-upstream-stable: released (3.16.7-ckt6)
+3.2-upstream-stable: N/A" "Introduced in 3.16 with f88649721268999bdff09777847080a52004f691"

© 2014-2024 Faster IT GmbH | imprint | privacy policy