[kernel-sec-discuss] r3600 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Tue Dec 9 05:21:46 UTC 2014


Author: jmm
Date: 2014-12-09 05:21:46 +0000 (Tue, 09 Dec 2014)
New Revision: 3600

Modified:
   active/CVE-2012-6657
   active/CVE-2014-3673
   active/CVE-2014-4508
   active/CVE-2014-4608
   active/CVE-2014-4653
   active/CVE-2014-4654
   active/CVE-2014-4655
   active/CVE-2014-4943
   active/CVE-2014-5077
   active/CVE-2014-5471
   active/CVE-2014-5472
   active/CVE-2014-9090
Log:
2.6.32-48squeeze9 released


Modified: active/CVE-2012-6657
===================================================================
--- active/CVE-2012-6657	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2012-6657	2014-12-09 05:21:46 UTC (rev 3600)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: released (2.6.32.61)
 sid: released (3.6.4-1)
 3.2-wheezy-security: released (3.2.32-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.16-upstream-stable: N/A
 3.2-upstream-stable: released (3.2.31)

Modified: active/CVE-2014-3673
===================================================================
--- active/CVE-2014-3673	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-3673	2014-12-09 05:21:46 UTC (rev 3600)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: released (2.6.32.64)
 sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-skb_over_panic-when-receiving-malformed.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/all/net-sctp-fix-skb_over_panic-when-receiving-malformed.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: released (3.2.64)

Modified: active/CVE-2014-4508
===================================================================
--- active/CVE-2014-4508	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-4508	2014-12-09 05:21:46 UTC (rev 3600)
@@ -8,5 +8,5 @@
 sid: released (3.14.9-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch]
 3.2-wheezy-security: released (3.2.60-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch]
 3.16-upstream-stable: N/A
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.2-upstream-stable: released (3.2.61) [x86_32-entry-do-syscall-exit-work-on-badsys-cve-2014-4508.patch]

Modified: active/CVE-2014-4608
===================================================================
--- active/CVE-2014-4608	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-4608	2014-12-09 05:21:46 UTC (rev 3600)
@@ -8,5 +8,5 @@
 sid: released (3.14.9-1)
 3.2-wheezy-security: released (3.2.63-1)
 3.16-upstream-stable: N/A
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.2-upstream-stable: released (3.2.61) [lib-lzo-rename-lzo1x_decompress.c-to-lzo1x_decompress_safe.c.patch, lib-lzo-update-lzo-compression-to-current-upstream-version.patch, lzo-properly-check-for-overruns.patch]

Modified: active/CVE-2014-4653
===================================================================
--- active/CVE-2014-4653	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-4653	2014-12-09 05:21:46 UTC (rev 3600)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.14.9-1)
 3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Don-t-access-controls-outside-of-protec.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.16-upstream-stable: N/A
 3.2-upstream-stable: released (3.2.61) [alsa-control-don-t-access-controls-outside-of-protected-regions.patch]

Modified: active/CVE-2014-4654
===================================================================
--- active/CVE-2014-4654	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-4654	2014-12-09 05:21:46 UTC (rev 3600)
@@ -7,5 +7,5 @@
 sid: released (3.14.9-1)
 3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Fix-replacing-user-controls.patch]
 3.16-upstream-stable: N/A
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.2-upstream-stable: released (3.2.61) [alsa-control-fix-replacing-user-controls.patch]

Modified: active/CVE-2014-4655
===================================================================
--- active/CVE-2014-4655	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-4655	2014-12-09 05:21:46 UTC (rev 3600)
@@ -7,5 +7,5 @@
 sid: released (3.14.9-1)
 3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Fix-replacing-user-controls.patch]
 3.16-upstream-stable: N/A
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.2-upstream-stable: released (3.2.61) [alsa-control-fix-replacing-user-controls.patch]

Modified: active/CVE-2014-4943
===================================================================
--- active/CVE-2014-4943	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-4943	2014-12-09 05:21:46 UTC (rev 3600)
@@ -7,5 +7,5 @@
 sid: released (3.14.13-1) [bugfix/all/net-l2tp-don-t-fall-back-on-UDP-get-set-sockopt.patch]
 3.2-wheezy-security: released (3.2.60-1+deb7u3) [bugfix/all/net-l2tp-don-t-fall-back-on-UDP-get-set-sockopt.patch]
 3.16-upstream-stable: N/A
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9) [bugfix/all/CVE-2014-4943.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze9) [bugfix/all/CVE-2014-4943.patch]
 3.2-upstream-stable: released (3.2.62) [net-l2tp-don-t-fall-back-on-udp-sockopt.patch]

Modified: active/CVE-2014-5077
===================================================================
--- active/CVE-2014-5077	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-5077	2014-12-09 05:21:46 UTC (rev 3600)
@@ -10,5 +10,5 @@
 sid: released (3.14.15-1) [bugfix/all/net-sctp-inherit-auth_capable-on-INIT-collisions.patch]
 3.2-wheezy-security: released (3.2.63-1)
 3.16-upstream-stable: N/A
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.2-upstream-stable: released (3.2.63) [net-sctp-inherit-auth_capable-on-init-collisions.patch]

Modified: active/CVE-2014-5471
===================================================================
--- active/CVE-2014-5471	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-5471	2014-12-09 05:21:46 UTC (rev 3600)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: released (2.6.32.64)
 sid: released (3.16.2-2)
 3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.16-upstream-stable: released (3.16.2)
 3.2-upstream-stable: released (3.2.63) [isofs-fix-unbounded-recursion-when-processing-relocated-directories.patch]

Modified: active/CVE-2014-5472
===================================================================
--- active/CVE-2014-5472	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-5472	2014-12-09 05:21:46 UTC (rev 3600)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: released (2.6.32.64)
 sid: released (3.16.2-2)
 3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.16-upstream-stable: released (3.16.2)
 3.2-upstream-stable: released (3.2.63) [isofs-fix-unbounded-recursion-when-processing-relocated-directories.patch]

Modified: active/CVE-2014-9090
===================================================================
--- active/CVE-2014-9090	2014-12-09 05:14:11 UTC (rev 3599)
+++ active/CVE-2014-9090	2014-12-09 05:21:46 UTC (rev 3600)
@@ -8,6 +8,6 @@
 2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.16.7-ckt2-1) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
 3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze9)
+2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.16-upstream-stable: needed
 3.2-upstream-stable:




More information about the kernel-sec-discuss mailing list