[kernel-sec-discuss] r3433 - active
Ben Hutchings
benh at moszumanska.debian.org
Tue Jul 8 19:09:10 UTC 2014
Author: benh
Date: 2014-07-08 19:09:10 +0000 (Tue, 08 Jul 2014)
New Revision: 3433
Modified:
active/CVE-2014-0131
active/CVE-2014-3917
active/CVE-2014-3940
active/CVE-2014-4027
active/CVE-2014-4157
active/CVE-2014-4508
active/CVE-2014-4608
active/CVE-2014-4652
active/CVE-2014-4653
active/CVE-2014-4654
active/CVE-2014-4655
active/CVE-2014-4656
active/CVE-2014-4667
active/CVE-2014-4699
Log:
Update for 3.2.61-rc1
Modified: active/CVE-2014-0131
===================================================================
--- active/CVE-2014-0131 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-0131 2014-07-08 19:09:10 UTC (rev 3433)
@@ -8,4 +8,4 @@
sid: released (3.13.6-1) [bugfix/all/net-use-kfree_skb_list-helper.patch, bugfix/all/0001-skbuff-skb_segment-s-frag-nskb_frag.patch, bugfix/all/0002-skbuff-skb_segment-s-skb_frag-frag.patch, bugfix/all/0003-skbuff-skb_segment-s-skb-head_skb.patch, bugfix/all/0004-skbuff-skb_segment-s-fskb-list_skb.patch, bugfix/all/0005-skbuff-skb_segment-orphan-frags-before-copying.patch]
3.2-wheezy-security: released (3.2.57-1) [bugfix/all/skbuff-skb_segment-orphan-frags-before-copying.patch]
2.6.32-squeeze-security: N/A "zerocopy introduced in 3.1"
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.61) [skbuff-add-an-api-to-orphan-frags.patch, skbuff-export-skb_copy_ubufs.patch, skbuff-skb_segment-orphan-frags-before-copying.patch]
Modified: active/CVE-2014-3917
===================================================================
--- active/CVE-2014-3917 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-3917 2014-07-08 19:09:10 UTC (rev 3433)
@@ -8,4 +8,4 @@
sid: released (3.14.7-1) [bugfix/all/auditsc-audit_krule-mask-accesses-need-bounds-checki.patch]
3.2-wheezy-security: released (3.2.60-1) [bugfix/all/auditsc-audit_krule-mask-accesses-need-bounds-checki.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze8)
-3.2-upstream-stable:
+3.2-upstream-stable: pending (3.2.61) [auditsc-audit_krule-mask-accesses-need-bounds-checking.patch]
Modified: active/CVE-2014-3940
===================================================================
--- active/CVE-2014-3940 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-3940 2014-07-08 19:09:10 UTC (rev 3433)
@@ -12,4 +12,4 @@
sid: released (3.14.7-1)
3.2-wheezy-security: released (3.2.60-1) [bugfix/all/mm-add-pte_present-check-on-existing-hugetlb_entry-c.patch]
2.6.32-squeeze-security: N/A "Only needed for 3.12 and later"
-3.2-upstream-stable: needed
+3.2-upstream-stable: N/A "Only needed for 3.12 and later"
Modified: active/CVE-2014-4027
===================================================================
--- active/CVE-2014-4027 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4027 2014-07-08 19:09:10 UTC (rev 3433)
@@ -8,4 +8,5 @@
sid: released (3.14.2-1)
3.2-wheezy-security: released (3.2.60-1) [bugfix/all/target-explicitly-clear-ramdisk_mcp-backend-pages.patch]
2.6.32-squeeze-security: N/A "Introduced in 2.6.38"
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.61) [target-explicitly-clear-ramdisk_mcp-backend-pages.patch]
+
Modified: active/CVE-2014-4157
===================================================================
--- active/CVE-2014-4157 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4157 2014-07-08 19:09:10 UTC (rev 3433)
@@ -8,4 +8,4 @@
sid: released (3.14.7-1) [bugfix/mips/MIPS-asm-thread_info-Add-_TIF_SECCOMP-flag.patch]
3.2-wheezy-security: released (3.2.60-1) [bugfix/mips/MIPS-Cleanup-flags-in-syscall-flags-handlers.patch, bugfix/mips/MIPS-asm-thread_info-Add-_TIF_SECCOMP-flag.patch]
2.6.32-squeeze-security: N/A "LTS only covers x86"
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.61) [mips-cleanup-flags-in-syscall-flags-handlers.patch, mips-asm-thread_info-add-_tif_seccomp-flag.patch]
Modified: active/CVE-2014-4508
===================================================================
--- active/CVE-2014-4508 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4508 2014-07-08 19:09:10 UTC (rev 3433)
@@ -8,4 +8,4 @@
sid: released (3.14.9-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch]
3.2-wheezy-security: released (3.2.60-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch]
2.6.32-squeeze-security:
-3.2-upstream-stable:
+3.2-upstream-stable: pending (3.2.61) [x86_32-entry-do-syscall-exit-work-on-badsys-cve-2014-4508.patch]
Modified: active/CVE-2014-4608
===================================================================
--- active/CVE-2014-4608 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4608 2014-07-08 19:09:10 UTC (rev 3433)
@@ -8,4 +8,4 @@
sid: released (3.14.9-1)
3.2-wheezy-security:
2.6.32-squeeze-security:
-3.2-upstream-stable:
+3.2-upstream-stable: pending (3.2.61) [lib-lzo-rename-lzo1x_decompress.c-to-lzo1x_decompress_safe.c.patch, lib-lzo-update-lzo-compression-to-current-upstream-version.patch, lzo-properly-check-for-overruns.patch]
Modified: active/CVE-2014-4652
===================================================================
--- active/CVE-2014-4652 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4652 2014-07-08 19:09:10 UTC (rev 3433)
@@ -7,4 +7,4 @@
sid: released (3.14.9-1)
3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Protect-user-controls-against-concurren.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze8)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.61) [alsa-control-protect-user-controls-against-concurrent-access.patch]
Modified: active/CVE-2014-4653
===================================================================
--- active/CVE-2014-4653 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4653 2014-07-08 19:09:10 UTC (rev 3433)
@@ -7,4 +7,4 @@
sid: released (3.14.9-1)
3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Don-t-access-controls-outside-of-protec.patch]
2.6.32-squeeze-security: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.61) [alsa-control-don-t-access-controls-outside-of-protected-regions.patch]
Modified: active/CVE-2014-4654
===================================================================
--- active/CVE-2014-4654 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4654 2014-07-08 19:09:10 UTC (rev 3433)
@@ -7,4 +7,4 @@
sid: released (3.14.9-1)
3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Fix-replacing-user-controls.patch]
2.6.32-squeeze-security: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.61) [alsa-control-fix-replacing-user-controls.patch]
Modified: active/CVE-2014-4655
===================================================================
--- active/CVE-2014-4655 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4655 2014-07-08 19:09:10 UTC (rev 3433)
@@ -7,4 +7,4 @@
sid: released (3.14.9-1)
3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Fix-replacing-user-controls.patch]
2.6.32-squeeze-security: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.61) [alsa-control-fix-replacing-user-controls.patch]
Modified: active/CVE-2014-4656
===================================================================
--- active/CVE-2014-4656 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4656 2014-07-08 19:09:10 UTC (rev 3433)
@@ -7,4 +7,4 @@
sid: released (3.14.9-1)
3.2-wheezy-security: released (3.2.60-1) [bugfix/all/ALSA-control-Make-sure-that-id-index-does-not-overfl.patch, bugfix/all/ALSA-control-Handle-numid-overflow.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze8)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.61) [alsa-control-make-sure-that-id-index-does-not-overflow.patch, alsa-control-handle-numid-overflow.patch]
Modified: active/CVE-2014-4667
===================================================================
--- active/CVE-2014-4667 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4667 2014-07-08 19:09:10 UTC (rev 3433)
@@ -7,4 +7,4 @@
sid: released (3.14.9-1)
3.2-wheezy-security:
2.6.32-squeeze-security: pending (2.6.32-48squeeze8)
-3.2-upstream-stable:
+3.2-upstream-stable: pending (3.2.61) [sctp-fix-sk_ack_backlog-wrap-around-problem.patch]
Modified: active/CVE-2014-4699
===================================================================
--- active/CVE-2014-4699 2014-07-08 17:37:29 UTC (rev 3432)
+++ active/CVE-2014-4699 2014-07-08 19:09:10 UTC (rev 3433)
@@ -7,4 +7,4 @@
sid: released (3.14.10-1)
3.2-wheezy-security: released (3.2.60-1+deb7u1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze8)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.61) [ptrace-x86-force-iret-path-after-a-ptrace_stop.patch]
More information about the kernel-sec-discuss
mailing list