[kernel-sec-discuss] r3608 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Sat Dec 13 23:23:25 UTC 2014


Author: jmm
Date: 2014-12-13 23:23:25 +0000 (Sat, 13 Dec 2014)
New Revision: 3608

Modified:
   active/CVE-2014-3184
   active/CVE-2014-3185
   active/CVE-2014-3687
   active/CVE-2014-3688
   active/CVE-2014-4653
   active/CVE-2014-4654
   active/CVE-2014-4655
   active/CVE-2014-4943
   active/CVE-2014-6410
   active/CVE-2014-7841
   active/CVE-2014-8559
   active/CVE-2014-8709
   active/CVE-2014-8884
   active/CVE-2014-9090
Log:
fixes from 2.6.32.65


Modified: active/CVE-2014-3184
===================================================================
--- active/CVE-2014-3184	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-3184	2014-12-13 23:23:25 UTC (rev 3608)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.17-rc2) [6817ae225cd650fb1c3295d769298c38b1eba818]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.16.2-2)
 3.2-wheezy-security: released (3.2.63-1)
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-3185
===================================================================
--- active/CVE-2014-3185	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-3185	2014-12-13 23:23:25 UTC (rev 3608)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.17-rc3) [6817ae225cd650fb1c3295d769298c38b1eba818]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.16.2-2)
 3.2-wheezy-security: released (3.2.63-1)
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-3687
===================================================================
--- active/CVE-2014-3687	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-3687	2014-12-13 23:23:25 UTC (rev 3608)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.18-rc1) [b69040d8e39f20d5215a03502a8e8b4c6ab78395]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [debian/patches/bugfix/all/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-3688
===================================================================
--- active/CVE-2014-3688	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-3688	2014-12-13 23:23:25 UTC (rev 3608)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.18-rc1) [26b87c7881006311828bb0ab271a551a62dcceb4]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-remote-memory-pressure-from-excessive-q.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/all/net-sctp-fix-remote-memory-pressure-from-excessive-q.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-4653
===================================================================
--- active/CVE-2014-4653	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-4653	2014-12-13 23:23:25 UTC (rev 3608)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.16-rc2) [fd9f26e4eca5d08a27d12c0933fceef76ed9663d]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.14.9-1)
 3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Don-t-access-controls-outside-of-protec.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze9)

Modified: active/CVE-2014-4654
===================================================================
--- active/CVE-2014-4654	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-4654	2014-12-13 23:23:25 UTC (rev 3608)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.16-rc2) [82262a46627bebb0febcc26664746c25cef08563]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.14.9-1)
 3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Fix-replacing-user-controls.patch]
 3.16-upstream-stable: N/A

Modified: active/CVE-2014-4655
===================================================================
--- active/CVE-2014-4655	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-4655	2014-12-13 23:23:25 UTC (rev 3608)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.16-rc2) [82262a46627bebb0febcc26664746c25cef08563]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.14.9-1)
 3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Fix-replacing-user-controls.patch]
 3.16-upstream-stable: N/A

Modified: active/CVE-2014-4943
===================================================================
--- active/CVE-2014-4943	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-4943	2014-12-13 23:23:25 UTC (rev 3608)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.16-rc6) [3cf521f7dc87c031617fd47e4b7aa2593c2f3daf]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.14.13-1) [bugfix/all/net-l2tp-don-t-fall-back-on-UDP-get-set-sockopt.patch]
 3.2-wheezy-security: released (3.2.60-1+deb7u3) [bugfix/all/net-l2tp-don-t-fall-back-on-UDP-get-set-sockopt.patch]
 3.16-upstream-stable: N/A

Modified: active/CVE-2014-6410
===================================================================
--- active/CVE-2014-6410	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-6410	2014-12-13 23:23:25 UTC (rev 3608)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.17-rc5) [c03aa9f6e1f938618e6db2e23afef0574efeeb65]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.16.5-1)
 3.2-wheezy-security: released (3.2.63-1) [bugfix/all/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-7841
===================================================================
--- active/CVE-2014-7841	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-7841	2014-12-13 23:23:25 UTC (rev 3608)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (v3.18-rc5) [e40607cbe270a9e8360907cb1e62ddf0736e4864]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.16.7-ckt2-1)
 3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-8559
===================================================================
--- active/CVE-2014-8559	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-8559	2014-12-13 23:23:25 UTC (rev 3608)
@@ -11,7 +11,7 @@
  - https://git.kernel.org/linus/946e51f2bf37f1656916eb75bd0742ba33983c28
 Notes:
 Bugs:
-upstream: needed
+upstream:
 2.6.32-upstream-stable:
 sid:
 3.2-wheezy-security:

Modified: active/CVE-2014-8709
===================================================================
--- active/CVE-2014-8709	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-8709	2014-12-13 23:23:25 UTC (rev 3608)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.14) [338f977f4eb441e69bb9a46eaa0ac715c931a67f]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.14-1)
 3.2-wheezy-security: released (3.2.57-1)
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-8884
===================================================================
--- active/CVE-2014-8884	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-8884	2014-12-13 23:23:25 UTC (rev 3608)
@@ -4,7 +4,7 @@
  drivers/media/dvb/ttusb-dec in older kernels
 Bugs:
 upstream: released [f2e323ec96077642d397bb1c355def536d489d16] (v3.18-rc1)
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.16.7-ckt2-1)
 3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2014-9090
===================================================================
--- active/CVE-2014-9090	2014-12-13 12:50:46 UTC (rev 3607)
+++ active/CVE-2014-9090	2014-12-13 23:23:25 UTC (rev 3608)
@@ -5,7 +5,7 @@
  willy has made backports for 2.6.32, pending upstream review
 Bugs:
 upstream: released (3.18-rc6) [6f442be2fb22be02cafa606f1769fa1e6f894441]
-2.6.32-upstream-stable: pending (2.6.32.65)
+2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.16.7-ckt2-1) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/x86/x86_64-traps-Stop-using-IST-for-SS.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze9)




More information about the kernel-sec-discuss mailing list