Package: openssl
Version: 0.9.8o-4squeeze21
CVE ID : CVE-2014-8176 CVE-2015-1789 CVE-2015-1790 CVE-2015-1791
CVE-2015-1792 CVE-2015-4000
Multiple vulnerabilities were discovered in OpenSSL, a Secure Sockets
Layer toolkit.
CVE-2014-8176
Praveen
Package: linux-2.6
Version: 2.6.32-48squeeze12
CVE ID : CVE-2011-5321 CVE-2012-6689 CVE-2014-3184 CVE-2014-8159
CVE-2014-9683 CVE-2014-9728 CVE-2014-9729 CVE-2014-9730
CVE-2014-9731 CVE-2015-1805 CVE-2015-2041 CVE-2015-2042
Hi Patrick,
On Mittwoch, 17. Juni 2015, Patrick Matthäi wrote:
We have got problems with the new version on all of our vSphere 5.1/5.5
VMs and dedicated hosts.
It looks like our xen VMs are not affected. Here some snips of dmesg:
to confirm #789037 - you've only seen this on 32bit archs
Am 17.06.2015 um 13:44 schrieb Holger Levsen:
Hi Patrick,
On Mittwoch, 17. Juni 2015, Patrick Matthäi wrote:
We have got problems with the new version on all of our vSphere 5.1/5.5
VMs and dedicated hosts.
It looks like our xen VMs are not affected. Here some snips of dmesg:
to confirm
Hi,
On Mon, Jun 15, 2015 at 04:53:00PM +0200, Michael Banck wrote:
Hello,
The VENOM vulnerability is unfixed in squeeze (except for
squeeze-backports):
https://security-tracker.debian.org/tracker/CVE-2015-3456
Even though qemu is not supported in squeeze-lts, I propose to fix this
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Format: 1.8
Date: Wed, 17 Jun 2015 13:44:28 +0100
Source: linux-2.6
Binary: linux-tools-2.6.32 linux-source-2.6.32 linux-doc-2.6.32
linux-manual-2.6.32 linux-patch-debian-2.6.32 firmware-linux-free
linux-support-2.6.32-5 linux-base linux-libc-dev