[kernel-sec-discuss] r3861 - active retired

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Jul 13 06:15:16 UTC 2015


Author: jmm
Date: 2015-07-13 06:15:16 +0000 (Mon, 13 Jul 2015)
New Revision: 3861

Added:
   retired/CVE-2015-4001
   retired/CVE-2015-4002
   retired/CVE-2015-4003
Removed:
   active/CVE-2015-4001
   active/CVE-2015-4002
   active/CVE-2015-4003
Log:
retire


Deleted: active/CVE-2015-4001
===================================================================
--- active/CVE-2015-4001	2015-07-13 06:14:15 UTC (rev 3860)
+++ active/CVE-2015-4001	2015-07-13 06:15:16 UTC (rev 3861)
@@ -1,13 +0,0 @@
-Description: ozwpan: Use unsigned ints to prevent heap overflow
-References:
-Notes:
- jmm> unsupported staging driver
-Bugs:
-upstream: released (4.1-rc7) [b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c]
-3.16-upstream-stable: released (3.16.7-ckt14)
-3.2-upstream-stable: N/A "Vulnerable code not present"
-2.6.32-upstream-stable: N/A "Vulnerable code not present"
-sid: ignored "driver is not enabled in Debian configuration"
-3.16-jessie-security: ignored "driver is not enabled in Debian configuration"
-3.2-wheezy-security: N/A "Vulnerable code not present"
-2.6.32-squeeze-security: N/A "Vulnerable code not present"

Deleted: active/CVE-2015-4002
===================================================================
--- active/CVE-2015-4002	2015-07-13 06:14:15 UTC (rev 3860)
+++ active/CVE-2015-4002	2015-07-13 06:15:16 UTC (rev 3861)
@@ -1,13 +0,0 @@
-Description: ozwpan: lack of a check for whether a length value (elt->length or len) was too small
-References:
-Notes:
- jmm> unsupported staging driver
-Bugs:
-upstream: released (4.1-rc7) [d114b9fe78c8d6fc6e70808c2092aa307c36dc8e, 9a59029bc218b48eff8b5d4dde5662fd79d3e1a8]
-3.16-upstream-stable: released (3.16.7-ckt14)
-3.2-upstream-stable: N/A "Vulnerable code not present"
-2.6.32-upstream-stable: N/A "Vulnerable code not present"
-sid: ignored "driver is not enabled in Debian configuration"
-3.16-jessie-security: ignored "driver is not enabled in Debian configuration"
-3.2-wheezy-security: N/A "Vulnerable code not present"
-2.6.32-squeeze-security: N/A "Vulnerable code not present"

Deleted: active/CVE-2015-4003
===================================================================
--- active/CVE-2015-4003	2015-07-13 06:14:15 UTC (rev 3860)
+++ active/CVE-2015-4003	2015-07-13 06:15:16 UTC (rev 3861)
@@ -1,13 +0,0 @@
-Description: ozwpan: divide-by-zero leading to panic
-References:
-Notes:
- jmm> unsupported staging driver
-Bugs:
-upstream: released (4.1-rc7) [4bf464a5dfd9ade0dda918e44366c2c61fce80b]
-3.16-upstream-stable: released (3.16.7-ckt14)
-3.2-upstream-stable: N/A "Vulnerable code not present"
-2.6.32-upstream-stable: N/A "Vulnerable code not present"
-sid: ignored "driver is not enabled in Debian configuration"
-3.16-jessie-security: ignored "driver is not enabled in Debian configuration"
-3.2-wheezy-security: N/A "Vulnerable code not present"
-2.6.32-squeeze-security: N/A "Vulnerable code not present"

Copied: retired/CVE-2015-4001 (from rev 3860, active/CVE-2015-4001)
===================================================================
--- retired/CVE-2015-4001	                        (rev 0)
+++ retired/CVE-2015-4001	2015-07-13 06:15:16 UTC (rev 3861)
@@ -0,0 +1,13 @@
+Description: ozwpan: Use unsigned ints to prevent heap overflow
+References:
+Notes:
+ jmm> unsupported staging driver
+Bugs:
+upstream: released (4.1-rc7) [b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c]
+3.16-upstream-stable: released (3.16.7-ckt14)
+3.2-upstream-stable: N/A "Vulnerable code not present"
+2.6.32-upstream-stable: N/A "Vulnerable code not present"
+sid: ignored "driver is not enabled in Debian configuration"
+3.16-jessie-security: ignored "driver is not enabled in Debian configuration"
+3.2-wheezy-security: N/A "Vulnerable code not present"
+2.6.32-squeeze-security: N/A "Vulnerable code not present"

Copied: retired/CVE-2015-4002 (from rev 3860, active/CVE-2015-4002)
===================================================================
--- retired/CVE-2015-4002	                        (rev 0)
+++ retired/CVE-2015-4002	2015-07-13 06:15:16 UTC (rev 3861)
@@ -0,0 +1,13 @@
+Description: ozwpan: lack of a check for whether a length value (elt->length or len) was too small
+References:
+Notes:
+ jmm> unsupported staging driver
+Bugs:
+upstream: released (4.1-rc7) [d114b9fe78c8d6fc6e70808c2092aa307c36dc8e, 9a59029bc218b48eff8b5d4dde5662fd79d3e1a8]
+3.16-upstream-stable: released (3.16.7-ckt14)
+3.2-upstream-stable: N/A "Vulnerable code not present"
+2.6.32-upstream-stable: N/A "Vulnerable code not present"
+sid: ignored "driver is not enabled in Debian configuration"
+3.16-jessie-security: ignored "driver is not enabled in Debian configuration"
+3.2-wheezy-security: N/A "Vulnerable code not present"
+2.6.32-squeeze-security: N/A "Vulnerable code not present"

Copied: retired/CVE-2015-4003 (from rev 3860, active/CVE-2015-4003)
===================================================================
--- retired/CVE-2015-4003	                        (rev 0)
+++ retired/CVE-2015-4003	2015-07-13 06:15:16 UTC (rev 3861)
@@ -0,0 +1,13 @@
+Description: ozwpan: divide-by-zero leading to panic
+References:
+Notes:
+ jmm> unsupported staging driver
+Bugs:
+upstream: released (4.1-rc7) [4bf464a5dfd9ade0dda918e44366c2c61fce80b]
+3.16-upstream-stable: released (3.16.7-ckt14)
+3.2-upstream-stable: N/A "Vulnerable code not present"
+2.6.32-upstream-stable: N/A "Vulnerable code not present"
+sid: ignored "driver is not enabled in Debian configuration"
+3.16-jessie-security: ignored "driver is not enabled in Debian configuration"
+3.2-wheezy-security: N/A "Vulnerable code not present"
+2.6.32-squeeze-security: N/A "Vulnerable code not present"




More information about the kernel-sec-discuss mailing list