summaryrefslogtreecommitdiffstats
path: root/retired
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2013-06-11 18:36:09 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2013-06-11 18:36:09 +0000
commitf0e7d6f37233eb8eeb9a52fa79055690639b5d6d (patch)
tree997b45170b7848dbcc42c7710852ca0f03d1319a /retired
parent13ef569ae31125e920d5c47cc7d7dab606691b2d (diff)
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2981 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired')
-rw-r--r--retired/CVE-2011-269511
-rw-r--r--retired/CVE-2011-269916
-rw-r--r--retired/CVE-2012-239013
-rw-r--r--retired/CVE-2012-343010
-rw-r--r--retired/CVE-2012-355210
-rw-r--r--retired/CVE-2012-439811
-rw-r--r--retired/CVE-2012-444410
-rw-r--r--retired/CVE-2012-446112
-rw-r--r--retired/CVE-2012-450811
-rw-r--r--retired/CVE-2012-453013
-rw-r--r--retired/CVE-2012-456511
-rw-r--r--retired/CVE-2012-653711
12 files changed, 139 insertions, 0 deletions
diff --git a/retired/CVE-2011-2695 b/retired/CVE-2011-2695
new file mode 100644
index 00000000..0b9366a7
--- /dev/null
+++ b/retired/CVE-2011-2695
@@ -0,0 +1,11 @@
+Description: ext4: kernel panic when writing data to the last block of sparse file
+References:
+Notes:
+ dannf> Reproduced and verified fix using case described in git commit log
+Bugs:
+upstream: released (3.0) [f17722f917b2f21497deb6edc62fb1683daa08e6]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.0.0-1)
+3.2-wheezy-security: N/A
+2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/ext4-Fix-max-file-size-and-logical-block-counting-of-extent-format-file.patch]
+3.2-upstream-stable: N/A
diff --git a/retired/CVE-2011-2699 b/retired/CVE-2011-2699
new file mode 100644
index 00000000..04806d58
--- /dev/null
+++ b/retired/CVE-2011-2699
@@ -0,0 +1,16 @@
+Description: ipv6: make fragment identifications less predictable
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=723429
+ http://thread.gmane.org/gmane.linux.network/201773/focus=201776
+Notes:
+ jmm> probably too intrusive for a lenny backport
+ dannf> including 2c1409a0, to make the inet_getid changes apply cleanly to .32
+ jmm> Initial fix for 2.6.32 removed, since it led to VM crashes: #643817
+Bugs:
+upstream: released (3.1-rc1) [87c48fa3b4630905f98268dde838ee43626a060c]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.0.0-2) [bugfix/all/stable/3.0.2.patch]
+2.6.26-lenny-security: ignored "end of life"
+3.2-wheezy-security: N/A
+2.6.32-squeeze-security: released (2.6.32-41)
+3.2-upstream-stable: N/A
diff --git a/retired/CVE-2012-2390 b/retired/CVE-2012-2390
new file mode 100644
index 00000000..77c7d6af
--- /dev/null
+++ b/retired/CVE-2012-2390
@@ -0,0 +1,13 @@
+Description: huge pages: memory leak on mmap failure
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=824345
+ http://www.spinics.net/lists/linux-mm/msg34763.html
+ https://lkml.org/lkml/2012/5/21/385
+Notes:
+Bugs:
+upstream: released (3.5-rc1) [4523e1458566a0e8ecfaff90f380dd23acc44d27, c50ac050811d6485616a193eb0f37bfbd191cc89]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.2.19-1) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-null-pointer.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-NULL-pointer.patch]
+3.2-wheezy-security: released (3.2.19-1)
+3.2-upstream-stable: released (3.2.20) [queue-3.2/hugetlb-fix-resv_map-leak-in-error-path.patch, queue-3.2/mm-fix-vma_resv_map-null-pointer.patch]
diff --git a/retired/CVE-2012-3430 b/retired/CVE-2012-3430
new file mode 100644
index 00000000..07d4bfad
--- /dev/null
+++ b/retired/CVE-2012-3430
@@ -0,0 +1,10 @@
+Description: recv{from,msg}() on an rds socket can leak kernel memory
+References:
+Notes:
+Bugs:
+upstream: released (3.6-rc1) [06b6a1cf6e776426766298d055bb3991957d90a7]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.2.29-1) [bugfix/all/rds-set-correct-msg_namelen.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/rds-set-correct-msg_namelen.patch]
+3.2-wheezy-security: released (3.2.29-1)
+3.2-upstream-stable: released (3.2.31)
diff --git a/retired/CVE-2012-3552 b/retired/CVE-2012-3552
new file mode 100644
index 00000000..726046e1
--- /dev/null
+++ b/retired/CVE-2012-3552
@@ -0,0 +1,10 @@
+Description: net: slab corruption due to improper synchronization round inet->opt
+References:
+Notes:
+Bugs:
+upstream: released (3.0) [f6d8bd051c391c1c0458a30b2a7abcd939329259]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.0-1)
+2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/inet-add-RCU-protection-to-inet-opt.patch]
+3.2-wheezy-security: N/A
+3.2-upstream-stable: N/A
diff --git a/retired/CVE-2012-4398 b/retired/CVE-2012-4398
new file mode 100644
index 00000000..056221a6
--- /dev/null
+++ b/retired/CVE-2012-4398
@@ -0,0 +1,11 @@
+Description: request_module() OOM local DoS
+References:
+ http://www.openwall.com/lists/oss-security/2012/08/31/12
+Notes:
+Bugs:
+upstream: released (3.4) [b3449922, d0bd587a, 5b9bd473, 3e63a93b, 1cc684ab]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.2.35-1)
+2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/usermodehelper-introduce-umh_complete.patch, bugfix/all/usermodehelper-implement-UMH_KILLABLE.patch, bugfix/all/usermodehelper-____call_usermodehelper-doesnt-need-do_exit.patch, bugfix/all/kmod-introduce-call_modprobe-helper.patch, bugfix/all/kmod-make-__request_module-killable.patch]
+3.2-wheezy-security: released (3.2.35-1)
+3.2-upstream-stable: released (3.2.40)
diff --git a/retired/CVE-2012-4444 b/retired/CVE-2012-4444
new file mode 100644
index 00000000..859204e5
--- /dev/null
+++ b/retired/CVE-2012-4444
@@ -0,0 +1,10 @@
+Description:
+References:
+Notes:
+Bugs:
+upstream: released (2.6.36) [70789d7052239992824628db8133de08dc78e593]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (2.6.36-1~experimental.1)
+2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/ipv6-discard-overlapping-fragment.patch]
+3.2-upstream-stable: N/A
+3.2-wheezy-security: N/A
diff --git a/retired/CVE-2012-4461 b/retired/CVE-2012-4461
new file mode 100644
index 00000000..1fc8420b
--- /dev/null
+++ b/retired/CVE-2012-4461
@@ -0,0 +1,12 @@
+Description: kvm: invalid opcode oops on SET_SREGS with OSXSAVE bit set
+References:
+ http://article.gmane.org/gmane.comp.emulators.kvm.devel/100742
+ https://bugzilla.redhat.com/show_bug.cgi?id=862900
+Notes:
+Bugs:
+upstream: released (3.7-rc6) [6d1068b3a98519247d8ba4ec85cd40ac136dbdf9]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.2.35-1)
+2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/x86/KVM-x86-invalid-opcode-oops-on-SET_SREGS-with-OSXSAV.patch]
+3.2-upstream-stable: released (3.2.36)
+3.2-wheezy-security: released (3.2.35-1)
diff --git a/retired/CVE-2012-4508 b/retired/CVE-2012-4508
new file mode 100644
index 00000000..3c6fcf0c
--- /dev/null
+++ b/retired/CVE-2012-4508
@@ -0,0 +1,11 @@
+Description: ext4: AIO vs fallocate stale data exposure
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=869904#c1
+Notes:
+Bugs:
+upstream: released (3.7-rc2) [dee1f973ca341c266229faa5a1a5bb268bed3531g]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.2.35-1)
+2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ext4-AIO-vs-fallocate-stale-data-exposure.patch]
+3.2-upstream-stable: released (3.2.33)
+3.2-wheezy-security: released (3.2.35-1)
diff --git a/retired/CVE-2012-4530 b/retired/CVE-2012-4530
new file mode 100644
index 00000000..8417a9d6
--- /dev/null
+++ b/retired/CVE-2012-4530
@@ -0,0 +1,13 @@
+Description:
+References:
+ http://www.halfdog.net/Security/2012/LinuxKernelBinfmtScriptStackDataDisclosure/
+ https://lkml.org/lkml/2012/10/11/513
+Notes:
+ jmm> Likely also bf2a9a39639b8b51377905397a5005f444e9a892
+Bugs:
+upstream: released (v3.8-rc1) [d740269867021faf4ce38a449353d2b986c34a67, b66c5984017533316fd1951770302649baf1aa33]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.2.35-1)
+2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/exec-do-not-leave-bprm-interp-on-stack.patch, bugfix/all/exec-use-ELOOP-for-max-recursion-depth.patch]
+3.2-upstream-stable: released (3.2.36)
+3.2-wheezy-security: released (3.2.35-1)
diff --git a/retired/CVE-2012-4565 b/retired/CVE-2012-4565
new file mode 100644
index 00000000..3cca8526
--- /dev/null
+++ b/retired/CVE-2012-4565
@@ -0,0 +1,11 @@
+Description: net: divide by zero in tcp algorithm illinois
+References:
+ http://thread.gmane.org/gmane.linux.network/247871
+Notes:
+Bugs:
+upstream: released (3.7-rc4) [8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.2.35-1)
+2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/net-fix-divide-by-zero-in-tcp-algorithm-illinois.patch]
+3.2-wheezy-security: released (3.2.35-1)
+3.2-upstream-stable: released (3.2.34) [df769f065d7bebf0ddc5f61605dbb1d8ea5ee2d8]
diff --git a/retired/CVE-2012-6537 b/retired/CVE-2012-6537
new file mode 100644
index 00000000..7d6dc9d2
--- /dev/null
+++ b/retired/CVE-2012-6537
@@ -0,0 +1,11 @@
+Description: info leak in xfrm_user
+References:
+ http://www.openwall.com/lists/oss-security/2013/03/14/21
+Notes:
+Bugs:
+upstream: released (3.6) [1f86840f897717f86d523a13e99a447e6a5d2fa5, 7b789836f434c87168eab067cfbed1ec4783dffd, f778a636713a435d3a922c60b1622a91136560c1]
+2.6.32-upstream-stable: released (2.6.32.61)
+sid: released (3.2.32-1)
+2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/xfrm_user-fix-info-leak-in-copy_to_user_state.patch, bugfix/all/xfrm_user-fix-info-leak-in-copy_to_user_policy.patch, bugfix/all/xfrm_user-fix-info-leak-in-copy_to_user_tmpl.patch]
+3.2-upstream-stable: released (3.2.31) [e470a5bc5c80cad5d8877701784351c2d8cdb6bc, bc39fa8d3deb34d5d0cfd86aafb8033ac4a4ed90, 26d560eb8ee3e6dd505a5a8a43ff904c279f60ce]
+3.2-wheezy-security: released (3.2.32-1) \ No newline at end of file

© 2014-2024 Faster IT GmbH | imprint | privacy policy