[kernel-sec-discuss] r3636 - active retired

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Jan 5 06:13:58 UTC 2015


Author: jmm
Date: 2015-01-05 06:13:57 +0000 (Mon, 05 Jan 2015)
New Revision: 3636

Added:
   retired/CVE-2014-6410
   retired/CVE-2014-7841
   retired/CVE-2014-8884
Removed:
   active/CVE-2014-6410
   active/CVE-2014-7841
   active/CVE-2014-8884
Log:
retire


Deleted: active/CVE-2014-6410
===================================================================
--- active/CVE-2014-6410	2015-01-05 06:13:05 UTC (rev 3635)
+++ active/CVE-2014-6410	2015-01-05 06:13:57 UTC (rev 3636)
@@ -1,11 +0,0 @@
-Description: udf: Avoid infinite loop when processing indirect ICBs
-References:
-Notes:
-Bugs:
-upstream: released (3.17-rc5) [c03aa9f6e1f938618e6db2e23afef0574efeeb65]
-2.6.32-upstream-stable: released (2.6.32.65)
-sid: released (3.16.5-1)
-3.2-wheezy-security: released (3.2.63-1) [bugfix/all/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch]
-2.6.32-squeeze-security: released (2.6.32-48squeeze10)
-3.16-upstream-stable: released (3.16.5)
-3.2-upstream-stable: released (3.2.66) [udf-avoid-infinite-loop-when-processing-indirect-icbs.patch]

Deleted: active/CVE-2014-7841
===================================================================
--- active/CVE-2014-7841	2015-01-05 06:13:05 UTC (rev 3635)
+++ active/CVE-2014-7841	2015-01-05 06:13:57 UTC (rev 3636)
@@ -1,11 +0,0 @@
-Description: sctp: NULL pointer dereference in af->from_addr_param on malformed packet
-References:
-Notes:
-Bugs:
-upstream: released (v3.18-rc5) [e40607cbe270a9e8360907cb1e62ddf0736e4864]
-2.6.32-upstream-stable: released (2.6.32.65)
-sid: released (3.16.7-ckt2-1)
-3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
-2.6.32-squeeze-security: released (2.6.32-48squeeze10)
-3.16-upstream-stable: released (3.16.7-ckt2)
-3.2-upstream-stable: released (3.2.66) [net-sctp-fix-null-pointer-dereference-in-af-from_addr_param-on.patch]

Deleted: active/CVE-2014-8884
===================================================================
--- active/CVE-2014-8884	2015-01-05 06:13:05 UTC (rev 3635)
+++ active/CVE-2014-8884	2015-01-05 06:13:57 UTC (rev 3636)
@@ -1,12 +0,0 @@
-Description: ttusb-dec: overflow by descriptor
-References:
-Notes:
- drivers/media/dvb/ttusb-dec in older kernels
-Bugs:
-upstream: released [f2e323ec96077642d397bb1c355def536d489d16] (v3.18-rc1)
-2.6.32-upstream-stable: released (2.6.32.65)
-sid: released (3.16.7-ckt2-1)
-3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch]
-2.6.32-squeeze-security: released (2.6.32-48squeeze10)
-3.16-upstream-stable: released (3.16.7-ckt2)
-3.2-upstream-stable: released (3.2.66) [ttusb-dec-buffer-overflow-in-ioctl.patch]

Copied: retired/CVE-2014-6410 (from rev 3634, active/CVE-2014-6410)
===================================================================
--- retired/CVE-2014-6410	                        (rev 0)
+++ retired/CVE-2014-6410	2015-01-05 06:13:57 UTC (rev 3636)
@@ -0,0 +1,11 @@
+Description: udf: Avoid infinite loop when processing indirect ICBs
+References:
+Notes:
+Bugs:
+upstream: released (3.17-rc5) [c03aa9f6e1f938618e6db2e23afef0574efeeb65]
+2.6.32-upstream-stable: released (2.6.32.65)
+sid: released (3.16.5-1)
+3.2-wheezy-security: released (3.2.63-1) [bugfix/all/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze10)
+3.16-upstream-stable: released (3.16.5)
+3.2-upstream-stable: released (3.2.66) [udf-avoid-infinite-loop-when-processing-indirect-icbs.patch]


Property changes on: retired/CVE-2014-6410
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2014-7841 (from rev 3634, active/CVE-2014-7841)
===================================================================
--- retired/CVE-2014-7841	                        (rev 0)
+++ retired/CVE-2014-7841	2015-01-05 06:13:57 UTC (rev 3636)
@@ -0,0 +1,11 @@
+Description: sctp: NULL pointer dereference in af->from_addr_param on malformed packet
+References:
+Notes:
+Bugs:
+upstream: released (v3.18-rc5) [e40607cbe270a9e8360907cb1e62ddf0736e4864]
+2.6.32-upstream-stable: released (2.6.32.65)
+sid: released (3.16.7-ckt2-1)
+3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze10)
+3.16-upstream-stable: released (3.16.7-ckt2)
+3.2-upstream-stable: released (3.2.66) [net-sctp-fix-null-pointer-dereference-in-af-from_addr_param-on.patch]


Property changes on: retired/CVE-2014-7841
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2014-8884 (from rev 3634, active/CVE-2014-8884)
===================================================================
--- retired/CVE-2014-8884	                        (rev 0)
+++ retired/CVE-2014-8884	2015-01-05 06:13:57 UTC (rev 3636)
@@ -0,0 +1,12 @@
+Description: ttusb-dec: overflow by descriptor
+References:
+Notes:
+ drivers/media/dvb/ttusb-dec in older kernels
+Bugs:
+upstream: released [f2e323ec96077642d397bb1c355def536d489d16] (v3.18-rc1)
+2.6.32-upstream-stable: released (2.6.32.65)
+sid: released (3.16.7-ckt2-1)
+3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze10)
+3.16-upstream-stable: released (3.16.7-ckt2)
+3.2-upstream-stable: released (3.2.66) [ttusb-dec-buffer-overflow-in-ioctl.patch]


Property changes on: retired/CVE-2014-8884
___________________________________________________________________
Added: svn:mergeinfo
   + 




More information about the kernel-sec-discuss mailing list