[kernel-sec-discuss] r3538 - active retired

Moritz Muehlenhoff jmm at moszumanska.debian.org
Thu Nov 6 10:50:23 UTC 2014


Author: jmm
Date: 2014-11-06 10:50:23 +0000 (Thu, 06 Nov 2014)
New Revision: 3538

Added:
   retired/CVE-2014-3181
   retired/CVE-2014-3186
Removed:
   active/CVE-2014-3181
   active/CVE-2014-3186
Log:
retire


Deleted: active/CVE-2014-3181
===================================================================
--- active/CVE-2014-3181	2014-11-06 10:49:55 UTC (rev 3537)
+++ active/CVE-2014-3181	2014-11-06 10:50:23 UTC (rev 3538)
@@ -1,12 +0,0 @@
-Description: 
-References:
- https://code.google.com/p/google-security-research/issues/detail?id=100
-Notes:
-Bugs:
-upstream: released (3.17-rc3) [c54def7bd64d7c0b6993336abcffb8444795bf38]
-2.6.32-upstream-stable: N/A "Vulnerable code not present"
-sid: released (3.16.5-1)
-3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security: N/A "Vulnerable code not present"
-3.16-upstream-stable: released (3.16.4)
-3.2-upstream-stable: released (3.2.63)

Deleted: active/CVE-2014-3186
===================================================================
--- active/CVE-2014-3186	2014-11-06 10:49:55 UTC (rev 3537)
+++ active/CVE-2014-3186	2014-11-06 10:50:23 UTC (rev 3538)
@@ -1,12 +0,0 @@
-Description: HID: picolcd: sanity check report size in raw_event() callback
-References:
- https://code.google.com/p/google-security-research/issues/detail?id=101
-Notes:
-Bugs:
-upstream: released (3.17-rc3) [844817e47eef14141cf59b8d5ac08dd11c0a9189]
-2.6.32-upstream-stable: N/A "Vulnerable code not present"
-sid: released (3.16.5-1)
-3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security: N/A "Vulnerable code not present"
-3.16-upstream-stable: released (3.16.4)
-3.2-upstream-stable: released (3.2.63)

Copied: retired/CVE-2014-3181 (from rev 3537, active/CVE-2014-3181)
===================================================================
--- retired/CVE-2014-3181	                        (rev 0)
+++ retired/CVE-2014-3181	2014-11-06 10:50:23 UTC (rev 3538)
@@ -0,0 +1,12 @@
+Description: 
+References:
+ https://code.google.com/p/google-security-research/issues/detail?id=100
+Notes:
+Bugs:
+upstream: released (3.17-rc3) [c54def7bd64d7c0b6993336abcffb8444795bf38]
+2.6.32-upstream-stable: N/A "Vulnerable code not present"
+sid: released (3.16.5-1)
+3.2-wheezy-security: released (3.2.63-1)
+2.6.32-squeeze-security: N/A "Vulnerable code not present"
+3.16-upstream-stable: released (3.16.4)
+3.2-upstream-stable: released (3.2.63)

Copied: retired/CVE-2014-3186 (from rev 3537, active/CVE-2014-3186)
===================================================================
--- retired/CVE-2014-3186	                        (rev 0)
+++ retired/CVE-2014-3186	2014-11-06 10:50:23 UTC (rev 3538)
@@ -0,0 +1,12 @@
+Description: HID: picolcd: sanity check report size in raw_event() callback
+References:
+ https://code.google.com/p/google-security-research/issues/detail?id=101
+Notes:
+Bugs:
+upstream: released (3.17-rc3) [844817e47eef14141cf59b8d5ac08dd11c0a9189]
+2.6.32-upstream-stable: N/A "Vulnerable code not present"
+sid: released (3.16.5-1)
+3.2-wheezy-security: released (3.2.63-1)
+2.6.32-squeeze-security: N/A "Vulnerable code not present"
+3.16-upstream-stable: released (3.16.4)
+3.2-upstream-stable: released (3.2.63)




More information about the kernel-sec-discuss mailing list