[kernel-sec-discuss] r3592 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Fri Dec 5 15:55:08 UTC 2014


Author: jmm
Date: 2014-12-05 15:55:08 +0000 (Fri, 05 Dec 2014)
New Revision: 3592

Modified:
   active/CVE-2014-3184
   active/CVE-2014-3185
   active/CVE-2014-3687
   active/CVE-2014-3688
   active/CVE-2014-6410
   active/CVE-2014-7841
   active/CVE-2014-8709
   active/CVE-2014-8884
Log:
fixes pending for 2.6.32.65


Modified: active/CVE-2014-3184
===================================================================
--- active/CVE-2014-3184	2014-12-05 15:54:41 UTC (rev 3591)
+++ active/CVE-2014-3184	2014-12-05 15:55:08 UTC (rev 3592)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.17-rc2) [6817ae225cd650fb1c3295d769298c38b1eba818]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.16.2-2)
 3.2-wheezy-security: released (3.2.63-1)
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-3185
===================================================================
--- active/CVE-2014-3185	2014-12-05 15:54:41 UTC (rev 3591)
+++ active/CVE-2014-3185	2014-12-05 15:55:08 UTC (rev 3592)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.17-rc3) [6817ae225cd650fb1c3295d769298c38b1eba818]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.16.2-2)
 3.2-wheezy-security: released (3.2.63-1)
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-3687
===================================================================
--- active/CVE-2014-3687	2014-12-05 15:54:41 UTC (rev 3591)
+++ active/CVE-2014-3687	2014-12-05 15:55:08 UTC (rev 3592)
@@ -3,9 +3,9 @@
 Notes:
 Bugs:
 upstream: released (3.18-rc1) [b69040d8e39f20d5215a03502a8e8b4c6ab78395]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [debian/patches/bugfix/all/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: released (3.2.64)

Modified: active/CVE-2014-3688
===================================================================
--- active/CVE-2014-3688	2014-12-05 15:54:41 UTC (rev 3591)
+++ active/CVE-2014-3688	2014-12-05 15:55:08 UTC (rev 3592)
@@ -3,9 +3,9 @@
 Notes:
 Bugs:
 upstream: released (3.18-rc1) [26b87c7881006311828bb0ab271a551a62dcceb4]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-remote-memory-pressure-from-excessive-q.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/all/net-sctp-fix-remote-memory-pressure-from-excessive-q.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: released (3.2.64)

Modified: active/CVE-2014-6410
===================================================================
--- active/CVE-2014-6410	2014-12-05 15:54:41 UTC (rev 3591)
+++ active/CVE-2014-6410	2014-12-05 15:55:08 UTC (rev 3592)
@@ -3,9 +3,9 @@
 Notes:
 Bugs:
 upstream: released (3.17-rc5) [c03aa9f6e1f938618e6db2e23afef0574efeeb65]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.16.5-1)
 3.2-wheezy-security: released (3.2.63-1) [bugfix/all/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.5)
 3.2-upstream-stable: needed

Modified: active/CVE-2014-7841
===================================================================
--- active/CVE-2014-7841	2014-12-05 15:54:41 UTC (rev 3591)
+++ active/CVE-2014-7841	2014-12-05 15:55:08 UTC (rev 3592)
@@ -3,9 +3,9 @@
 Notes:
 Bugs:
 upstream: released (v3.18-rc5) [e40607cbe270a9e8360907cb1e62ddf0736e4864]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending (2.6.32.65)
 sid: needed
 3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt2)
 3.2-upstream-stable:

Modified: active/CVE-2014-8709
===================================================================
--- active/CVE-2014-8709	2014-12-05 15:54:41 UTC (rev 3591)
+++ active/CVE-2014-8709	2014-12-05 15:55:08 UTC (rev 3592)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.14) [338f977f4eb441e69bb9a46eaa0ac715c931a67f]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.14-1)
 3.2-wheezy-security: released (3.2.57-1)
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-8884
===================================================================
--- active/CVE-2014-8884	2014-12-05 15:54:41 UTC (rev 3591)
+++ active/CVE-2014-8884	2014-12-05 15:55:08 UTC (rev 3592)
@@ -4,7 +4,7 @@
  drivers/media/dvb/ttusb-dec in older kernels
 Bugs:
 upstream: released [f2e323ec96077642d397bb1c355def536d489d16] (v3.18-rc1)
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.65)
 sid: needed
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed




More information about the kernel-sec-discuss mailing list