[kernel-sec-discuss] r3794 - active retired

Moritz Muehlenhoff jmm at moszumanska.debian.org
Tue May 19 21:18:47 UTC 2015


Author: jmm
Date: 2015-05-19 21:18:46 +0000 (Tue, 19 May 2015)
New Revision: 3794

Added:
   retired/CVE-2014-8171
   retired/CVE-2014-9710
Removed:
   active/CVE-2014-8171
   active/CVE-2014-9710
Log:
retire


Deleted: active/CVE-2014-8171
===================================================================
--- active/CVE-2014-8171	2015-05-19 21:18:19 UTC (rev 3793)
+++ active/CVE-2014-8171	2015-05-19 21:18:46 UTC (rev 3794)
@@ -1,14 +0,0 @@
-Description: memcg: OOM handling DoS
-References:
-Notes:
- bwh> We require a kernel parameter to enable memcg, so most systems should
- bwh> not be affected.
-Bugs:
-upstream: released (v3.12-rc1) [3812c8c8f3953921ef18544110dafc3505c1ac62], (v3.12-rc6) [4942642080ea82d99ab5b653abb9a12b7ba31f4a]
-2.6.32-upstream-stable: ignored
-sid: released (3.12.6-1)
-3.16-jessie-security: N/A "Fixed before initial release"
-3.2-wheezy-security: ignored "Too difficult and risky to backport"
-2.6.32-squeeze-security: ignored "Too difficult and risky to backport"
-3.16-upstream-stable: N/A "Fixed before initial release"
-3.2-upstream-stable: ignored "Too difficult and risky to backport"

Deleted: active/CVE-2014-9710
===================================================================
--- active/CVE-2014-9710	2015-05-19 21:18:19 UTC (rev 3793)
+++ active/CVE-2014-9710	2015-05-19 21:18:46 UTC (rev 3794)
@@ -1,12 +0,0 @@
-Description: btrfs: non-atomic xattr replace operation
-References:
-Notes:
-Bugs:
-upstream: released (3.19) [5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339]
-2.6.32-upstream-stable: ignored
-sid: released (3.16.7-ckt9-1) [bugfix/all/btrfs-make-xattr-replace-operations-atomic.patch]
-3.16-jessie-security: N/A "Fixed before initial release"
-3.2-wheezy-security: ignored "btrfs in wheezy is just a tech preview and not usable for production"
-2.6.32-squeeze-security: ignored "btrfs in squeeze is just a tech preview and not usable for production"
-3.16-upstream-stable: released (3.16.7-ckt10)
-3.2-upstream-stable: ignored "btrfs in 3.2 is just a tech preview and not usable for production"

Copied: retired/CVE-2014-8171 (from rev 3793, active/CVE-2014-8171)
===================================================================
--- retired/CVE-2014-8171	                        (rev 0)
+++ retired/CVE-2014-8171	2015-05-19 21:18:46 UTC (rev 3794)
@@ -0,0 +1,14 @@
+Description: memcg: OOM handling DoS
+References:
+Notes:
+ bwh> We require a kernel parameter to enable memcg, so most systems should
+ bwh> not be affected.
+Bugs:
+upstream: released (v3.12-rc1) [3812c8c8f3953921ef18544110dafc3505c1ac62], (v3.12-rc6) [4942642080ea82d99ab5b653abb9a12b7ba31f4a]
+2.6.32-upstream-stable: ignored
+sid: released (3.12.6-1)
+3.16-jessie-security: N/A "Fixed before initial release"
+3.2-wheezy-security: ignored "Too difficult and risky to backport"
+2.6.32-squeeze-security: ignored "Too difficult and risky to backport"
+3.16-upstream-stable: N/A "Fixed before initial release"
+3.2-upstream-stable: ignored "Too difficult and risky to backport"

Copied: retired/CVE-2014-9710 (from rev 3793, active/CVE-2014-9710)
===================================================================
--- retired/CVE-2014-9710	                        (rev 0)
+++ retired/CVE-2014-9710	2015-05-19 21:18:46 UTC (rev 3794)
@@ -0,0 +1,12 @@
+Description: btrfs: non-atomic xattr replace operation
+References:
+Notes:
+Bugs:
+upstream: released (3.19) [5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339]
+2.6.32-upstream-stable: ignored
+sid: released (3.16.7-ckt9-1) [bugfix/all/btrfs-make-xattr-replace-operations-atomic.patch]
+3.16-jessie-security: N/A "Fixed before initial release"
+3.2-wheezy-security: ignored "btrfs in wheezy is just a tech preview and not usable for production"
+2.6.32-squeeze-security: ignored "btrfs in squeeze is just a tech preview and not usable for production"
+3.16-upstream-stable: released (3.16.7-ckt10)
+3.2-upstream-stable: ignored "btrfs in 3.2 is just a tech preview and not usable for production"




More information about the kernel-sec-discuss mailing list