[kernel-sec-discuss] r3632 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Tue Dec 30 22:46:15 UTC 2014


Author: jmm
Date: 2014-12-30 22:46:14 +0000 (Tue, 30 Dec 2014)
New Revision: 3632

Modified:
   active/CVE-2014-7842
   active/CVE-2014-8134
   active/CVE-2014-9420
Log:
mark wheezy fixed as released now that they are in spu


Modified: active/CVE-2014-7842
===================================================================
--- active/CVE-2014-7842	2014-12-29 21:49:30 UTC (rev 3631)
+++ active/CVE-2014-7842	2014-12-30 22:46:14 UTC (rev 3632)
@@ -7,7 +7,7 @@
 upstream: released (3.18-rc1) [a2b9e6c1a35afcc0973acb72e591c714e78885ff]
 2.6.32-upstream-stable: ignored
 sid: released (3.16.7-ckt2-1)
-3.2-wheezy-security: pending (3.2.65-1) [bugfix/x86/kvm-x86-don-t-report-guest-userspace-emulation-error-to-userspace.patch]
+3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/kvm-x86-don-t-report-guest-userspace-emulation-error-to-userspace.patch]
 2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
 3.16-upstream-stable: released (3.16.7-ckt2)
 3.2-upstream-stable: pending (3.2.66) [kvm-x86-don-t-report-guest-userspace-emulation-error-to-userspace.patch]

Modified: active/CVE-2014-8134
===================================================================
--- active/CVE-2014-8134	2014-12-29 21:49:30 UTC (rev 3631)
+++ active/CVE-2014-8134	2014-12-30 22:46:14 UTC (rev 3632)
@@ -8,7 +8,7 @@
 upstream: released (3.19-rc1) [29fa6825463c97e5157284db80107d1bfac5d77b]
 2.6.32-upstream-stable: needed
 sid: needed
-3.2-wheezy-security: pending (3.2.65-1) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
+3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: needed
 3.2-upstream-stable: pending (3.2.66) [x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]

Modified: active/CVE-2014-9420
===================================================================
--- active/CVE-2014-9420	2014-12-29 21:49:30 UTC (rev 3631)
+++ active/CVE-2014-9420	2014-12-30 22:46:14 UTC (rev 3632)
@@ -5,7 +5,7 @@
 upstream: released (v3.19-rc1) [f54e18f1b831c92f6512d2eedb224cd63d607d3d]
 2.6.32-upstream-stable:
 sid:
-3.2-wheezy-security: pending (3.2.65-1) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
+3.2-wheezy-security: released (3.2.65-1) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
 2.6.32-squeeze-security:
 3.16-upstream-stable:
 3.2-upstream-stable:




More information about the kernel-sec-discuss mailing list