[kernel-sec-discuss] r3594 - active

Ben Hutchings benh at moszumanska.debian.org
Sun Dec 7 03:01:54 UTC 2014


Author: benh
Date: 2014-12-07 03:01:54 +0000 (Sun, 07 Dec 2014)
New Revision: 3594

Modified:
   active/CVE-2014-7825
   active/CVE-2014-7826
   active/CVE-2014-7841
   active/CVE-2014-8086
   active/CVE-2014-8369
   active/CVE-2014-8884
   active/CVE-2014-9090
Log:
Update issues pending or N/A for wheezy-security

Modified: active/CVE-2014-7825
===================================================================
--- active/CVE-2014-7825	2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-7825	2014-12-07 03:01:54 UTC (rev 3594)
@@ -6,7 +6,7 @@
 upstream: [086ba77a6db00ed858ff07451bedee197df868c9] (v3.18-rc3)
 2.6.32-upstream-stable:
 sid: pending (3.16.7-ckt1-1)
-3.2-wheezy-security:
+3.2-wheezy-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
 2.6.32-squeeze-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
 3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable:

Modified: active/CVE-2014-7826
===================================================================
--- active/CVE-2014-7826	2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-7826	2014-12-07 03:01:54 UTC (rev 3594)
@@ -7,7 +7,7 @@
 upstream: [086ba77a6db00ed858ff07451bedee197df868c9] (v3.18-rc3)
 2.6.32-upstream-stable: needed
 sid: pending (3.16.7-ckt1-1)
-3.2-wheezy-security:
+3.2-wheezy-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
 2.6.32-squeeze-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
 3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable:

Modified: active/CVE-2014-7841
===================================================================
--- active/CVE-2014-7841	2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-7841	2014-12-07 03:01:54 UTC (rev 3594)
@@ -5,7 +5,7 @@
 upstream: released (v3.18-rc5) [e40607cbe270a9e8360907cb1e62ddf0736e4864]
 2.6.32-upstream-stable: pending (2.6.32.65)
 sid: needed
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt2)
 3.2-upstream-stable:

Modified: active/CVE-2014-8086
===================================================================
--- active/CVE-2014-8086	2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-8086	2014-12-07 03:01:54 UTC (rev 3594)
@@ -6,7 +6,7 @@
 upstream: released (3.18-rc3) [a41537e69b4aa43f0fea02498c2595a81267383b]
 2.6.32-upstream-stable: N/A "Vulnerable code not present"
 sid: pending (3.16.7-ckt1-1)
-3.2-wheezy-security:
+3.2-wheezy-security: N/A "Vulnerable code not present"
 2.6.32-squeeze-security: N/A "Vulnerable code not present"
 3.16-upstream-stable: released (3.16.7-ckt1)
-3.2-upstream-stable:
+3.2-upstream-stable: N/A "Vulnerable code not present"

Modified: active/CVE-2014-8369
===================================================================
--- active/CVE-2014-8369	2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-8369	2014-12-07 03:01:54 UTC (rev 3594)
@@ -7,7 +7,7 @@
 upstream: released (3.18-rc2) [3d32e4dbe71374a6780eaf51d719d76f9a9bf22f]
 2.6.32-upstream-stable: N/A "Broken patch was never applied"
 sid: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/kvm-fix-excessive-pages-un-pinning-in-kvm_iommu_map-.patch]
 2.6.32-squeeze-security: N/A "Broken patch was never applied"
 3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: needed

Modified: active/CVE-2014-8884
===================================================================
--- active/CVE-2014-8884	2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-8884	2014-12-07 03:01:54 UTC (rev 3594)
@@ -6,7 +6,7 @@
 upstream: released [f2e323ec96077642d397bb1c355def536d489d16] (v3.18-rc1)
 2.6.32-upstream-stable: pending (2.6.32.65)
 sid: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt2)
 3.2-upstream-stable: needed

Modified: active/CVE-2014-9090
===================================================================
--- active/CVE-2014-9090	2014-12-05 16:12:58 UTC (rev 3593)
+++ active/CVE-2014-9090	2014-12-07 03:01:54 UTC (rev 3594)
@@ -7,7 +7,7 @@
 upstream: released (3.18-rc6) [6f442be2fb22be02cafa606f1769fa1e6f894441]
 2.6.32-upstream-stable:
 sid: needed
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
 2.6.32-squeeze-security:
 3.16-upstream-stable: needed
 3.2-upstream-stable:




More information about the kernel-sec-discuss mailing list