[kernel-sec-discuss] r3632 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Tue Dec 30 22:46:15 UTC 2014
Author: jmm
Date: 2014-12-30 22:46:14 +0000 (Tue, 30 Dec 2014)
New Revision: 3632
Modified:
active/CVE-2014-7842
active/CVE-2014-8134
active/CVE-2014-9420
Log:
mark wheezy fixed as released now that they are in spu
Modified: active/CVE-2014-7842
===================================================================
--- active/CVE-2014-7842 2014-12-29 21:49:30 UTC (rev 3631)
+++ active/CVE-2014-7842 2014-12-30 22:46:14 UTC (rev 3632)
@@ -7,7 +7,7 @@
upstream: released (3.18-rc1) [a2b9e6c1a35afcc0973acb72e591c714e78885ff]
2.6.32-upstream-stable: ignored
sid: released (3.16.7-ckt2-1)
-3.2-wheezy-security: pending (3.2.65-1) [bugfix/x86/kvm-x86-don-t-report-guest-userspace-emulation-error-to-userspace.patch]
+3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/kvm-x86-don-t-report-guest-userspace-emulation-error-to-userspace.patch]
2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
3.16-upstream-stable: released (3.16.7-ckt2)
3.2-upstream-stable: pending (3.2.66) [kvm-x86-don-t-report-guest-userspace-emulation-error-to-userspace.patch]
Modified: active/CVE-2014-8134
===================================================================
--- active/CVE-2014-8134 2014-12-29 21:49:30 UTC (rev 3631)
+++ active/CVE-2014-8134 2014-12-30 22:46:14 UTC (rev 3632)
@@ -8,7 +8,7 @@
upstream: released (3.19-rc1) [29fa6825463c97e5157284db80107d1bfac5d77b]
2.6.32-upstream-stable: needed
sid: needed
-3.2-wheezy-security: pending (3.2.65-1) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
+3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
2.6.32-squeeze-security: needed
3.16-upstream-stable: needed
3.2-upstream-stable: pending (3.2.66) [x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
Modified: active/CVE-2014-9420
===================================================================
--- active/CVE-2014-9420 2014-12-29 21:49:30 UTC (rev 3631)
+++ active/CVE-2014-9420 2014-12-30 22:46:14 UTC (rev 3632)
@@ -5,7 +5,7 @@
upstream: released (v3.19-rc1) [f54e18f1b831c92f6512d2eedb224cd63d607d3d]
2.6.32-upstream-stable:
sid:
-3.2-wheezy-security: pending (3.2.65-1) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
+3.2-wheezy-security: released (3.2.65-1) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
2.6.32-squeeze-security:
3.16-upstream-stable:
3.2-upstream-stable:
More information about the kernel-sec-discuss
mailing list