[kernel-sec-discuss] r3623 - active retired

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Dec 22 07:18:46 UTC 2014


Author: jmm
Date: 2014-12-22 07:18:46 +0000 (Mon, 22 Dec 2014)
New Revision: 3623

Added:
   retired/CVE-2014-3184
   retired/CVE-2014-3185
   retired/CVE-2014-3687
   retired/CVE-2014-3688
Removed:
   active/CVE-2014-3184
   active/CVE-2014-3185
   active/CVE-2014-3687
   active/CVE-2014-3688
Log:
retire


Deleted: active/CVE-2014-3184
===================================================================
--- active/CVE-2014-3184	2014-12-22 07:18:03 UTC (rev 3622)
+++ active/CVE-2014-3184	2014-12-22 07:18:46 UTC (rev 3623)
@@ -1,12 +0,0 @@
-Description: 
-References:
- https://code.google.com/p/google-security-research/issues/detail?id=91
-Notes:
-Bugs:
-upstream: released (3.17-rc2) [6817ae225cd650fb1c3295d769298c38b1eba818]
-2.6.32-upstream-stable: released (2.6.32.65)
-sid: released (3.16.2-2)
-3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security: released (2.6.32-48squeeze10)
-3.16-upstream-stable: released (3.16.2)
-3.2-upstream-stable: released (3.2.63)

Deleted: active/CVE-2014-3185
===================================================================
--- active/CVE-2014-3185	2014-12-22 07:18:03 UTC (rev 3622)
+++ active/CVE-2014-3185	2014-12-22 07:18:46 UTC (rev 3623)
@@ -1,12 +0,0 @@
-Description: 
-References:
- https://code.google.com/p/google-security-research/issues/detail?id=98
-Notes:
-Bugs:
-upstream: released (3.17-rc3) [6817ae225cd650fb1c3295d769298c38b1eba818]
-2.6.32-upstream-stable: released (2.6.32.65)
-sid: released (3.16.2-2)
-3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security: released (2.6.32-48squeeze10)
-3.16-upstream-stable: released (3.16.2)
-3.2-upstream-stable: released (3.2.63)

Deleted: active/CVE-2014-3687
===================================================================
--- active/CVE-2014-3687	2014-12-22 07:18:03 UTC (rev 3622)
+++ active/CVE-2014-3687	2014-12-22 07:18:46 UTC (rev 3623)
@@ -1,11 +0,0 @@
-Description: net: sctp: fix panic on duplicate ASCONF chunks
-References:
-Notes:
-Bugs:
-upstream: released (3.18-rc1) [b69040d8e39f20d5215a03502a8e8b4c6ab78395]
-2.6.32-upstream-stable: released (2.6.32.65)
-sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch]
-3.2-wheezy-security: released (3.2.63-2+deb7u1) [debian/patches/bugfix/all/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch]
-2.6.32-squeeze-security: released (2.6.32-48squeeze10)
-3.16-upstream-stable: released (3.16.7-ckt1)
-3.2-upstream-stable: released (3.2.64)

Deleted: active/CVE-2014-3688
===================================================================
--- active/CVE-2014-3688	2014-12-22 07:18:03 UTC (rev 3622)
+++ active/CVE-2014-3688	2014-12-22 07:18:46 UTC (rev 3623)
@@ -1,11 +0,0 @@
-Description: net: sctp: remote memory pressure from excessive queueing
-References:
-Notes:
-Bugs:
-upstream: released (3.18-rc1) [26b87c7881006311828bb0ab271a551a62dcceb4]
-2.6.32-upstream-stable: released (2.6.32.65)
-sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-remote-memory-pressure-from-excessive-q.patch]
-3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/all/net-sctp-fix-remote-memory-pressure-from-excessive-q.patch]
-2.6.32-squeeze-security: released (2.6.32-48squeeze10)
-3.16-upstream-stable: released (3.16.7-ckt1)
-3.2-upstream-stable: released (3.2.64)

Copied: retired/CVE-2014-3184 (from rev 3622, active/CVE-2014-3184)
===================================================================
--- retired/CVE-2014-3184	                        (rev 0)
+++ retired/CVE-2014-3184	2014-12-22 07:18:46 UTC (rev 3623)
@@ -0,0 +1,12 @@
+Description: 
+References:
+ https://code.google.com/p/google-security-research/issues/detail?id=91
+Notes:
+Bugs:
+upstream: released (3.17-rc2) [6817ae225cd650fb1c3295d769298c38b1eba818]
+2.6.32-upstream-stable: released (2.6.32.65)
+sid: released (3.16.2-2)
+3.2-wheezy-security: released (3.2.63-1)
+2.6.32-squeeze-security: released (2.6.32-48squeeze10)
+3.16-upstream-stable: released (3.16.2)
+3.2-upstream-stable: released (3.2.63)


Property changes on: retired/CVE-2014-3184
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2014-3185 (from rev 3622, active/CVE-2014-3185)
===================================================================
--- retired/CVE-2014-3185	                        (rev 0)
+++ retired/CVE-2014-3185	2014-12-22 07:18:46 UTC (rev 3623)
@@ -0,0 +1,12 @@
+Description: 
+References:
+ https://code.google.com/p/google-security-research/issues/detail?id=98
+Notes:
+Bugs:
+upstream: released (3.17-rc3) [6817ae225cd650fb1c3295d769298c38b1eba818]
+2.6.32-upstream-stable: released (2.6.32.65)
+sid: released (3.16.2-2)
+3.2-wheezy-security: released (3.2.63-1)
+2.6.32-squeeze-security: released (2.6.32-48squeeze10)
+3.16-upstream-stable: released (3.16.2)
+3.2-upstream-stable: released (3.2.63)


Property changes on: retired/CVE-2014-3185
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2014-3687 (from rev 3622, active/CVE-2014-3687)
===================================================================
--- retired/CVE-2014-3687	                        (rev 0)
+++ retired/CVE-2014-3687	2014-12-22 07:18:46 UTC (rev 3623)
@@ -0,0 +1,11 @@
+Description: net: sctp: fix panic on duplicate ASCONF chunks
+References:
+Notes:
+Bugs:
+upstream: released (3.18-rc1) [b69040d8e39f20d5215a03502a8e8b4c6ab78395]
+2.6.32-upstream-stable: released (2.6.32.65)
+sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch]
+3.2-wheezy-security: released (3.2.63-2+deb7u1) [debian/patches/bugfix/all/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze10)
+3.16-upstream-stable: released (3.16.7-ckt1)
+3.2-upstream-stable: released (3.2.64)


Property changes on: retired/CVE-2014-3687
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2014-3688 (from rev 3622, active/CVE-2014-3688)
===================================================================
--- retired/CVE-2014-3688	                        (rev 0)
+++ retired/CVE-2014-3688	2014-12-22 07:18:46 UTC (rev 3623)
@@ -0,0 +1,11 @@
+Description: net: sctp: remote memory pressure from excessive queueing
+References:
+Notes:
+Bugs:
+upstream: released (3.18-rc1) [26b87c7881006311828bb0ab271a551a62dcceb4]
+2.6.32-upstream-stable: released (2.6.32.65)
+sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-remote-memory-pressure-from-excessive-q.patch]
+3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/all/net-sctp-fix-remote-memory-pressure-from-excessive-q.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze10)
+3.16-upstream-stable: released (3.16.7-ckt1)
+3.2-upstream-stable: released (3.2.64)


Property changes on: retired/CVE-2014-3688
___________________________________________________________________
Added: svn:mergeinfo
   + 




More information about the kernel-sec-discuss mailing list