diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2015-01-05 06:13:57 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2015-01-05 06:13:57 +0000 |
commit | a85295706edb98781f6bee1bb2de843709aa3b04 (patch) | |
tree | eeee9ec65899cef42d5e7da3d2ffcfda83b7895e /retired | |
parent | 2a3b8f3f51d1238f0fd744f2b96dbaed42f2186e (diff) |
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3636 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r-- | retired/CVE-2014-6410 | 11 | ||||
-rw-r--r-- | retired/CVE-2014-7841 | 11 | ||||
-rw-r--r-- | retired/CVE-2014-8884 | 12 |
3 files changed, 34 insertions, 0 deletions
diff --git a/retired/CVE-2014-6410 b/retired/CVE-2014-6410 new file mode 100644 index 00000000..a34368a4 --- /dev/null +++ b/retired/CVE-2014-6410 @@ -0,0 +1,11 @@ +Description: udf: Avoid infinite loop when processing indirect ICBs +References: +Notes: +Bugs: +upstream: released (3.17-rc5) [c03aa9f6e1f938618e6db2e23afef0574efeeb65] +2.6.32-upstream-stable: released (2.6.32.65) +sid: released (3.16.5-1) +3.2-wheezy-security: released (3.2.63-1) [bugfix/all/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch] +2.6.32-squeeze-security: released (2.6.32-48squeeze10) +3.16-upstream-stable: released (3.16.5) +3.2-upstream-stable: released (3.2.66) [udf-avoid-infinite-loop-when-processing-indirect-icbs.patch] diff --git a/retired/CVE-2014-7841 b/retired/CVE-2014-7841 new file mode 100644 index 00000000..d7c7c4fd --- /dev/null +++ b/retired/CVE-2014-7841 @@ -0,0 +1,11 @@ +Description: sctp: NULL pointer dereference in af->from_addr_param on malformed packet +References: +Notes: +Bugs: +upstream: released (v3.18-rc5) [e40607cbe270a9e8360907cb1e62ddf0736e4864] +2.6.32-upstream-stable: released (2.6.32.65) +sid: released (3.16.7-ckt2-1) +3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch] +2.6.32-squeeze-security: released (2.6.32-48squeeze10) +3.16-upstream-stable: released (3.16.7-ckt2) +3.2-upstream-stable: released (3.2.66) [net-sctp-fix-null-pointer-dereference-in-af-from_addr_param-on.patch] diff --git a/retired/CVE-2014-8884 b/retired/CVE-2014-8884 new file mode 100644 index 00000000..48c7d08a --- /dev/null +++ b/retired/CVE-2014-8884 @@ -0,0 +1,12 @@ +Description: ttusb-dec: overflow by descriptor +References: +Notes: + drivers/media/dvb/ttusb-dec in older kernels +Bugs: +upstream: released [f2e323ec96077642d397bb1c355def536d489d16] (v3.18-rc1) +2.6.32-upstream-stable: released (2.6.32.65) +sid: released (3.16.7-ckt2-1) +3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch] +2.6.32-squeeze-security: released (2.6.32-48squeeze10) +3.16-upstream-stable: released (3.16.7-ckt2) +3.2-upstream-stable: released (3.2.66) [ttusb-dec-buffer-overflow-in-ioctl.patch] |