[kernel-sec-discuss] r3596 - active
Ben Hutchings
benh at moszumanska.debian.org
Mon Dec 8 00:10:20 UTC 2014
Author: benh
Date: 2014-12-08 00:10:20 +0000 (Mon, 08 Dec 2014)
New Revision: 3596
Modified:
active/CVE-2014-7841
active/CVE-2014-7843
active/CVE-2014-8369
active/CVE-2014-8884
active/CVE-2014-9090
Log:
Mark issues pending in sid (3.16.7-ckt2-1)
Modified: active/CVE-2014-7841
===================================================================
--- active/CVE-2014-7841 2014-12-07 20:50:32 UTC (rev 3595)
+++ active/CVE-2014-7841 2014-12-08 00:10:20 UTC (rev 3596)
@@ -4,7 +4,7 @@
Bugs:
upstream: released (v3.18-rc5) [e40607cbe270a9e8360907cb1e62ddf0736e4864]
2.6.32-upstream-stable: pending (2.6.32.65)
-sid: needed
+sid: pending (3.16.7-ckt2-1)
3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
2.6.32-squeeze-security: needed
3.16-upstream-stable: released (3.16.7-ckt2)
Modified: active/CVE-2014-7843
===================================================================
--- active/CVE-2014-7843 2014-12-07 20:50:32 UTC (rev 3595)
+++ active/CVE-2014-7843 2014-12-08 00:10:20 UTC (rev 3596)
@@ -6,7 +6,7 @@
Bugs:
upstream: released (3.18-rc5) [97fc15436b36ee3956efad83e22a557991f7d19d]
2.6.32-upstream-stable: N/A "arm64 introduced in 3.7"
-sid: needed
+sid: pending (3.16.7-ckt2-1)
3.2-wheezy-security: N/A "arm64 introduced in 3.7"
2.6.32-squeeze-security: N/A "arm64 introduced in 3.7"
3.16-upstream-stable: released (3.16.7-ckt2)
Modified: active/CVE-2014-8369
===================================================================
--- active/CVE-2014-8369 2014-12-07 20:50:32 UTC (rev 3595)
+++ active/CVE-2014-8369 2014-12-08 00:10:20 UTC (rev 3596)
@@ -6,7 +6,7 @@
Bugs:
upstream: released (3.18-rc2) [3d32e4dbe71374a6780eaf51d719d76f9a9bf22f]
2.6.32-upstream-stable: N/A "Broken patch was never applied"
-sid: needed
+sid: pending (3.16.7-ckt2-1)
3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/kvm-fix-excessive-pages-un-pinning-in-kvm_iommu_map-.patch]
2.6.32-squeeze-security: N/A "Broken patch was never applied"
3.16-upstream-stable: released (3.16.7-ckt1)
Modified: active/CVE-2014-8884
===================================================================
--- active/CVE-2014-8884 2014-12-07 20:50:32 UTC (rev 3595)
+++ active/CVE-2014-8884 2014-12-08 00:10:20 UTC (rev 3596)
@@ -5,7 +5,7 @@
Bugs:
upstream: released [f2e323ec96077642d397bb1c355def536d489d16] (v3.18-rc1)
2.6.32-upstream-stable: pending (2.6.32.65)
-sid: needed
+sid: pending (3.16.7-ckt2-1)
3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch]
2.6.32-squeeze-security: needed
3.16-upstream-stable: released (3.16.7-ckt2)
Modified: active/CVE-2014-9090
===================================================================
--- active/CVE-2014-9090 2014-12-07 20:50:32 UTC (rev 3595)
+++ active/CVE-2014-9090 2014-12-08 00:10:20 UTC (rev 3596)
@@ -6,7 +6,7 @@
Bugs:
upstream: released (3.18-rc6) [6f442be2fb22be02cafa606f1769fa1e6f894441]
2.6.32-upstream-stable: pending (2.6.32.65)
-sid: needed
+sid: pending (3.16.7-ckt2-1) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
3.16-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list