[kernel-sec-discuss] r3596 - active

Ben Hutchings benh at moszumanska.debian.org
Mon Dec 8 00:10:20 UTC 2014


Author: benh
Date: 2014-12-08 00:10:20 +0000 (Mon, 08 Dec 2014)
New Revision: 3596

Modified:
   active/CVE-2014-7841
   active/CVE-2014-7843
   active/CVE-2014-8369
   active/CVE-2014-8884
   active/CVE-2014-9090
Log:
Mark issues pending in sid (3.16.7-ckt2-1)

Modified: active/CVE-2014-7841
===================================================================
--- active/CVE-2014-7841	2014-12-07 20:50:32 UTC (rev 3595)
+++ active/CVE-2014-7841	2014-12-08 00:10:20 UTC (rev 3596)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (v3.18-rc5) [e40607cbe270a9e8360907cb1e62ddf0736e4864]
 2.6.32-upstream-stable: pending (2.6.32.65)
-sid: needed
+sid: pending (3.16.7-ckt2-1)
 3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt2)

Modified: active/CVE-2014-7843
===================================================================
--- active/CVE-2014-7843	2014-12-07 20:50:32 UTC (rev 3595)
+++ active/CVE-2014-7843	2014-12-08 00:10:20 UTC (rev 3596)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (3.18-rc5) [97fc15436b36ee3956efad83e22a557991f7d19d]
 2.6.32-upstream-stable: N/A "arm64 introduced in 3.7"
-sid: needed
+sid: pending (3.16.7-ckt2-1)
 3.2-wheezy-security: N/A "arm64 introduced in 3.7"
 2.6.32-squeeze-security: N/A "arm64 introduced in 3.7"
 3.16-upstream-stable: released (3.16.7-ckt2)

Modified: active/CVE-2014-8369
===================================================================
--- active/CVE-2014-8369	2014-12-07 20:50:32 UTC (rev 3595)
+++ active/CVE-2014-8369	2014-12-08 00:10:20 UTC (rev 3596)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (3.18-rc2) [3d32e4dbe71374a6780eaf51d719d76f9a9bf22f]
 2.6.32-upstream-stable: N/A "Broken patch was never applied"
-sid: needed
+sid: pending (3.16.7-ckt2-1)
 3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/kvm-fix-excessive-pages-un-pinning-in-kvm_iommu_map-.patch]
 2.6.32-squeeze-security: N/A "Broken patch was never applied"
 3.16-upstream-stable: released (3.16.7-ckt1)

Modified: active/CVE-2014-8884
===================================================================
--- active/CVE-2014-8884	2014-12-07 20:50:32 UTC (rev 3595)
+++ active/CVE-2014-8884	2014-12-08 00:10:20 UTC (rev 3596)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released [f2e323ec96077642d397bb1c355def536d489d16] (v3.18-rc1)
 2.6.32-upstream-stable: pending (2.6.32.65)
-sid: needed
+sid: pending (3.16.7-ckt2-1)
 3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt2)

Modified: active/CVE-2014-9090
===================================================================
--- active/CVE-2014-9090	2014-12-07 20:50:32 UTC (rev 3595)
+++ active/CVE-2014-9090	2014-12-08 00:10:20 UTC (rev 3596)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (3.18-rc6) [6f442be2fb22be02cafa606f1769fa1e6f894441]
 2.6.32-upstream-stable: pending (2.6.32.65)
-sid: needed
+sid: pending (3.16.7-ckt2-1) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
 3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
 3.16-upstream-stable: needed




More information about the kernel-sec-discuss mailing list