[kernel-sec-discuss] r3619 - active

Ben Hutchings benh at moszumanska.debian.org
Sun Dec 21 18:47:37 UTC 2014


Author: benh
Date: 2014-12-21 18:47:37 +0000 (Sun, 21 Dec 2014)
New Revision: 3619

Modified:
   active/CVE-2014-6410
   active/CVE-2014-7825
   active/CVE-2014-7826
   active/CVE-2014-7841
   active/CVE-2014-7842
   active/CVE-2014-8133
Log:
Mark various issues as fixes needed or released

Modified: active/CVE-2014-6410
===================================================================
--- active/CVE-2014-6410	2014-12-21 18:46:57 UTC (rev 3618)
+++ active/CVE-2014-6410	2014-12-21 18:47:37 UTC (rev 3619)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.16.5-1)
 3.2-wheezy-security: released (3.2.63-1) [bugfix/all/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: released (2.6.32-48squeeze10)
 3.16-upstream-stable: released (3.16.5)
 3.2-upstream-stable: needed

Modified: active/CVE-2014-7825
===================================================================
--- active/CVE-2014-7825	2014-12-21 18:46:57 UTC (rev 3618)
+++ active/CVE-2014-7825	2014-12-21 18:47:37 UTC (rev 3619)
@@ -2,11 +2,13 @@
 References:
  Fixed by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=086ba77a6db00ed858ff07451bedee197df868c9 (v3.18-rc3)
 Notes:
+ For 2.6.32, commit cd0980fc8add ("tracing: Check invalid syscall nr while
+ tracing syscalls") is also needed.
 Bugs:
-upstream: [086ba77a6db00ed858ff07451bedee197df868c9] (v3.18-rc3)
-2.6.32-upstream-stable:
+upstream: released (v3.18-rc3) [086ba77a6db00ed858ff07451bedee197df868c9]
+2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt2-1)
 3.2-wheezy-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
 2.6.32-squeeze-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
 3.16-upstream-stable: released (3.16.7-ckt1)
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.65)

Modified: active/CVE-2014-7826
===================================================================
--- active/CVE-2014-7826	2014-12-21 18:46:57 UTC (rev 3618)
+++ active/CVE-2014-7826	2014-12-21 18:47:37 UTC (rev 3619)
@@ -3,11 +3,13 @@
  Fixed by https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=086ba77a6db00ed858ff07451bedee197df868c9 (v3.18-rc3)
  Support for SOFT_DISABLE to syscall events was added in https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d562aff93bfb530b0992141500a402d17081189d (v3.13-rc1)
 Notes:
+ For 2.6.32, commit cd0980fc8add ("tracing: Check invalid syscall nr while
+ tracing syscalls") is also needed.
 Bugs:
-upstream: [086ba77a6db00ed858ff07451bedee197df868c9] (v3.18-rc3)
+upstream: released (v3.18-rc3) [086ba77a6db00ed858ff07451bedee197df868c9]
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt2-1)
 3.2-wheezy-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
 2.6.32-squeeze-security: N/A "CONFIG_FTRACE_SYSCALL not enabled"
 3.16-upstream-stable: released (3.16.7-ckt1)
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.65)

Modified: active/CVE-2014-7841
===================================================================
--- active/CVE-2014-7841	2014-12-21 18:46:57 UTC (rev 3618)
+++ active/CVE-2014-7841	2014-12-21 18:47:37 UTC (rev 3619)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: released (2.6.32.65)
 sid: released (3.16.7-ckt2-1)
 3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: released (2.6.32-48squeeze10)
 3.16-upstream-stable: released (3.16.7-ckt2)
-3.2-upstream-stable:
+3.2-upstream-stable: needed

Modified: active/CVE-2014-7842
===================================================================
--- active/CVE-2014-7842	2014-12-21 18:46:57 UTC (rev 3618)
+++ active/CVE-2014-7842	2014-12-21 18:47:37 UTC (rev 3619)
@@ -7,7 +7,7 @@
 upstream: released (3.18-rc1) [a2b9e6c1a35afcc0973acb72e591c714e78885ff]
 2.6.32-upstream-stable: ignored
 sid: released (3.16.7-ckt2-1)
-3.2-wheezy-security:
+3.2-wheezy-security: needed
 2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
 3.16-upstream-stable: released (3.16.7-ckt2)
-3.2-upstream-stable:
+3.2-upstream-stable: needed

Modified: active/CVE-2014-8133
===================================================================
--- active/CVE-2014-8133	2014-12-21 18:46:57 UTC (rev 3618)
+++ active/CVE-2014-8133	2014-12-21 18:47:37 UTC (rev 3619)
@@ -2,10 +2,10 @@
 References:
 Notes:
 Bugs:
-upstream: pending [41bdc78544b8a93a9c6814b8bbbfef966272abbe]
-2.6.32-upstream-stable:
-sid:
-3.2-wheezy-security:
-2.6.32-squeeze-security:
-3.16-upstream-stable:
-3.2-upstream-stable:
+upstream: released (3.19-rc1) [41bdc78544b8a93a9c6814b8bbbfef966272abbe]
+2.6.32-upstream-stable: needed
+sid: needed
+3.2-wheezy-security: needed
+2.6.32-squeeze-security: needed
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list