[kernel-sec-discuss] r3594 - active
Ben Hutchings
benh at moszumanska.debian.org
Sun Dec 7 03:01:54 UTC 2014
Author: benh
Date: 2014-12-07 03:01:54 +0000 (Sun, 07 Dec 2014)
New Revision: 3594
Modified:
active/CVE-2014-7825
active/CVE-2014-7826
active/CVE-2014-7841
active/CVE-2014-8086
active/CVE-2014-8369
active/CVE-2014-8884
active/CVE-2014-9090
Log:
Update issues pending or N/A for wheezy-security
Modified: active/CVE-2014-7825
===================================================================
--- active/CVE-2014-7825 2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-7825 2014-12-07 03:01:54 UTC (rev 3594)
@@ -6,7 +6,7 @@
upstream: [086ba77a6db00ed858ff07451bedee197df868c9] (v3.18-rc3)
2.6.32-upstream-stable:
sid: pending (3.16.7-ckt1-1)
-3.2-wheezy-security:
+3.2-wheezy-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
2.6.32-squeeze-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
3.16-upstream-stable: released (3.16.7-ckt1)
3.2-upstream-stable:
Modified: active/CVE-2014-7826
===================================================================
--- active/CVE-2014-7826 2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-7826 2014-12-07 03:01:54 UTC (rev 3594)
@@ -7,7 +7,7 @@
upstream: [086ba77a6db00ed858ff07451bedee197df868c9] (v3.18-rc3)
2.6.32-upstream-stable: needed
sid: pending (3.16.7-ckt1-1)
-3.2-wheezy-security:
+3.2-wheezy-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
2.6.32-squeeze-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
3.16-upstream-stable: released (3.16.7-ckt1)
3.2-upstream-stable:
Modified: active/CVE-2014-7841
===================================================================
--- active/CVE-2014-7841 2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-7841 2014-12-07 03:01:54 UTC (rev 3594)
@@ -5,7 +5,7 @@
upstream: released (v3.18-rc5) [e40607cbe270a9e8360907cb1e62ddf0736e4864]
2.6.32-upstream-stable: pending (2.6.32.65)
sid: needed
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
2.6.32-squeeze-security: needed
3.16-upstream-stable: released (3.16.7-ckt2)
3.2-upstream-stable:
Modified: active/CVE-2014-8086
===================================================================
--- active/CVE-2014-8086 2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-8086 2014-12-07 03:01:54 UTC (rev 3594)
@@ -6,7 +6,7 @@
upstream: released (3.18-rc3) [a41537e69b4aa43f0fea02498c2595a81267383b]
2.6.32-upstream-stable: N/A "Vulnerable code not present"
sid: pending (3.16.7-ckt1-1)
-3.2-wheezy-security:
+3.2-wheezy-security: N/A "Vulnerable code not present"
2.6.32-squeeze-security: N/A "Vulnerable code not present"
3.16-upstream-stable: released (3.16.7-ckt1)
-3.2-upstream-stable:
+3.2-upstream-stable: N/A "Vulnerable code not present"
Modified: active/CVE-2014-8369
===================================================================
--- active/CVE-2014-8369 2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-8369 2014-12-07 03:01:54 UTC (rev 3594)
@@ -7,7 +7,7 @@
upstream: released (3.18-rc2) [3d32e4dbe71374a6780eaf51d719d76f9a9bf22f]
2.6.32-upstream-stable: N/A "Broken patch was never applied"
sid: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/kvm-fix-excessive-pages-un-pinning-in-kvm_iommu_map-.patch]
2.6.32-squeeze-security: N/A "Broken patch was never applied"
3.16-upstream-stable: released (3.16.7-ckt1)
3.2-upstream-stable: needed
Modified: active/CVE-2014-8884
===================================================================
--- active/CVE-2014-8884 2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-8884 2014-12-07 03:01:54 UTC (rev 3594)
@@ -6,7 +6,7 @@
upstream: released [f2e323ec96077642d397bb1c355def536d489d16] (v3.18-rc1)
2.6.32-upstream-stable: pending (2.6.32.65)
sid: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch]
2.6.32-squeeze-security: needed
3.16-upstream-stable: released (3.16.7-ckt2)
3.2-upstream-stable: needed
Modified: active/CVE-2014-9090
===================================================================
--- active/CVE-2014-9090 2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-9090 2014-12-07 03:01:54 UTC (rev 3594)
@@ -7,7 +7,7 @@
upstream: released (3.18-rc6) [6f442be2fb22be02cafa606f1769fa1e6f894441]
2.6.32-upstream-stable:
sid: needed
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
2.6.32-squeeze-security:
3.16-upstream-stable: needed
3.2-upstream-stable:
More information about the kernel-sec-discuss
mailing list