diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2014-09-08 21:02:49 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2014-09-08 21:02:49 +0000 |
commit | d38c4a16a2d55b4d0f542e01ab327bb308a2cf81 (patch) | |
tree | 6cf4d55b02ca348867b76a9f0d9aa2ded2418cb5 /retired | |
parent | 121780c1e9f3ec92b670e1e7bd32f601ca7cd4af (diff) |
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3477 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r-- | retired/CVE-2014-5206 | 12 | ||||
-rw-r--r-- | retired/CVE-2014-5207 | 12 |
2 files changed, 24 insertions, 0 deletions
diff --git a/retired/CVE-2014-5206 b/retired/CVE-2014-5206 new file mode 100644 index 00000000..a16a9050 --- /dev/null +++ b/retired/CVE-2014-5206 @@ -0,0 +1,12 @@ +Description: ro bind mount bypass using user namespaces +References: + https://git.kernel.org/cgit/linux/kernel/git/ebiederm/user-namespace.git/commit/?h=for-linus&id=db181ce011e3c033328608299cd6fac06ea50130 + http://www.openwall.com/lists/oss-security/2014/08/12/6 +Notes: +Bugs: +upstream: released (3.17-rc1) [a6138db815df5ee542d848318e5dae681590fccd, 07b645589dcda8b7a5249e096fece2a67556f0f4, 9566d6742852c527bf5af38af5cbb878dad75705, ffbc6f0ead47fa5a1dc9642b0331cb75c20a640e, db181ce011e3c033328608299cd6fac06ea50130] +2.6.32-upstream-stable: N/A "User namespaces not usable" +sid: released (3.16.2-2) [bugfix/all/mnt-Only-change-user-settable-mount-flags-in-remount.patch, bugfix/all/mnt-Move-the-test-for-MNT_LOCK_READONLY-from-change_.patch, bugfix/all/mnt-Correct-permission-checks-in-do_remount.patch, bugfix/all/mnt-Change-the-default-remount-atime-from-relatime-t.patch, bugfix/all/mnt-Add-tests-for-unprivileged-remount-cases-that-ha.patch] +3.2-wheezy-security: N/A "User namespaces not usable" +2.6.32-squeeze-security: N/A "User namespaces not usable" +3.2-upstream-stable: N/A "User namespaces not usable" diff --git a/retired/CVE-2014-5207 b/retired/CVE-2014-5207 new file mode 100644 index 00000000..78c9d6ca --- /dev/null +++ b/retired/CVE-2014-5207 @@ -0,0 +1,12 @@ +Description: ro bind mount bypass using user namespaces +References: + https://git.kernel.org/cgit/linux/kernel/git/ebiederm/user-namespace.git/commit/?h=for-linus&id=9566d6742852c527bf5af38af5cbb878dad75705 + http://www.openwall.com/lists/oss-security/2014/08/12/6 +Notes: +Bugs: +upstream: released (3.17-rc1) [a6138db815df5ee542d848318e5dae681590fccd, 07b645589dcda8b7a5249e096fece2a67556f0f4, 9566d6742852c527bf5af38af5cbb878dad75705, ffbc6f0ead47fa5a1dc9642b0331cb75c20a640e, db181ce011e3c033328608299cd6fac06ea50130] +2.6.32-upstream-stable: N/A "User namespaces not usable" +sid: released (3.16.2-2) [bugfix/all/mnt-Only-change-user-settable-mount-flags-in-remount.patch, bugfix/all/mnt-Move-the-test-for-MNT_LOCK_READONLY-from-change_.patch, bugfix/all/mnt-Correct-permission-checks-in-do_remount.patch, bugfix/all/mnt-Change-the-default-remount-atime-from-relatime-t.patch, bugfix/all/mnt-Add-tests-for-unprivileged-remount-cases-that-ha.patch] +3.2-wheezy-security: N/A "User namespaces not usable" +2.6.32-squeeze-security: N/A "User namespaces not usable" +3.2-upstream-stable: N/A "User namespaces not usable" |