[kernel-sec-discuss] r3602 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Tue Dec 9 05:24:47 UTC 2014


Author: jmm
Date: 2014-12-09 05:24:47 +0000 (Tue, 09 Dec 2014)
New Revision: 3602

Modified:
   active/CVE-2014-7841
   active/CVE-2014-8369
   active/CVE-2014-8884
   active/CVE-2014-9090
Log:
fixes from wheezy-sec


Modified: active/CVE-2014-7841
===================================================================
--- active/CVE-2014-7841	2014-12-09 05:23:28 UTC (rev 3601)
+++ active/CVE-2014-7841	2014-12-09 05:24:47 UTC (rev 3602)
@@ -5,7 +5,7 @@
 upstream: released (v3.18-rc5) [e40607cbe270a9e8360907cb1e62ddf0736e4864]
 2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.16.7-ckt2-1)
-3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
+3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt2)
 3.2-upstream-stable:

Modified: active/CVE-2014-8369
===================================================================
--- active/CVE-2014-8369	2014-12-09 05:23:28 UTC (rev 3601)
+++ active/CVE-2014-8369	2014-12-09 05:24:47 UTC (rev 3602)
@@ -7,7 +7,7 @@
 upstream: released (3.18-rc2) [3d32e4dbe71374a6780eaf51d719d76f9a9bf22f]
 2.6.32-upstream-stable: N/A "Broken patch was never applied"
 sid: released (3.16.7-ckt2-1)
-3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/kvm-fix-excessive-pages-un-pinning-in-kvm_iommu_map-.patch]
+3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/kvm-fix-excessive-pages-un-pinning-in-kvm_iommu_map-.patch]
 2.6.32-squeeze-security: N/A "Broken patch was never applied"
 3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: needed

Modified: active/CVE-2014-8884
===================================================================
--- active/CVE-2014-8884	2014-12-09 05:23:28 UTC (rev 3601)
+++ active/CVE-2014-8884	2014-12-09 05:24:47 UTC (rev 3602)
@@ -6,7 +6,7 @@
 upstream: released [f2e323ec96077642d397bb1c355def536d489d16] (v3.18-rc1)
 2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.16.7-ckt2-1)
-3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch]
+3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt2)
 3.2-upstream-stable: needed

Modified: active/CVE-2014-9090
===================================================================
--- active/CVE-2014-9090	2014-12-09 05:23:28 UTC (rev 3601)
+++ active/CVE-2014-9090	2014-12-09 05:24:47 UTC (rev 3602)
@@ -7,7 +7,7 @@
 upstream: released (3.18-rc6) [6f442be2fb22be02cafa606f1769fa1e6f894441]
 2.6.32-upstream-stable: pending (2.6.32.65)
 sid: released (3.16.7-ckt2-1) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
-3.2-wheezy-security: pending (3.2.63-2+deb7u2) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
+3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze9)
 3.16-upstream-stable: needed
 3.2-upstream-stable:




More information about the kernel-sec-discuss mailing list