[kernel-sec-discuss] r3548 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Mon Nov 17 18:38:06 UTC 2014
Author: jmm
Date: 2014-11-17 18:38:06 +0000 (Mon, 17 Nov 2014)
New Revision: 3548
Modified:
active/CVE-2014-4508
active/CVE-2014-5077
active/CVE-2014-5471
active/CVE-2014-5472
Log:
fixes pending for 2.6.32.64
Modified: active/CVE-2014-4508
===================================================================
--- active/CVE-2014-4508 2014-11-14 21:31:26 UTC (rev 3547)
+++ active/CVE-2014-4508 2014-11-17 18:38:06 UTC (rev 3548)
@@ -4,9 +4,9 @@
Notes:
Bugs:
upstream: released (3.16-rc3) [554086d85e71f30abe46fc014fea31929a7c6a8a]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending (2.6.32.64)
sid: released (3.14.9-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch]
3.2-wheezy-security: released (3.2.60-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch]
3.16-upstream-stable: N/A
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.61) [x86_32-entry-do-syscall-exit-work-on-badsys-cve-2014-4508.patch]
Modified: active/CVE-2014-5077
===================================================================
--- active/CVE-2014-5077 2014-11-14 21:31:26 UTC (rev 3547)
+++ active/CVE-2014-5077 2014-11-17 18:38:06 UTC (rev 3548)
@@ -6,7 +6,7 @@
bwh> ('[SCTP]: Implete SCTP-AUTH parameter processing') i.e. in 2.6.24.
Bugs:
upstream: released (3.16) [1be9a950c646c9092fb3618197f7b6bfb50e82aa]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.64)
sid: released (3.14.15-1) [bugfix/all/net-sctp-inherit-auth_capable-on-INIT-collisions.patch]
3.2-wheezy-security: released (3.2.63-1)
3.16-upstream-stable: N/A
Modified: active/CVE-2014-5471
===================================================================
--- active/CVE-2014-5471 2014-11-14 21:31:26 UTC (rev 3547)
+++ active/CVE-2014-5471 2014-11-17 18:38:06 UTC (rev 3548)
@@ -3,9 +3,9 @@
Notes:
Bugs:
upstream: released (v3.17-rc2) [410dd3cf4c9b36f27ed4542ee18b1af5e68645a4]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending (2.6.32.64)
sid: released (3.16.2-2)
3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
3.16-upstream-stable: released (3.16.2)
3.2-upstream-stable: released (3.2.63) [isofs-fix-unbounded-recursion-when-processing-relocated-directories.patch]
Modified: active/CVE-2014-5472
===================================================================
--- active/CVE-2014-5472 2014-11-14 21:31:26 UTC (rev 3547)
+++ active/CVE-2014-5472 2014-11-17 18:38:06 UTC (rev 3548)
@@ -3,9 +3,9 @@
Notes:
Bugs:
upstream: released (v3.17-rc2) [410dd3cf4c9b36f27ed4542ee18b1af5e68645a4]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending (2.6.32.64)
sid: released (3.16.2-2)
3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
3.16-upstream-stable: released (3.16.2)
3.2-upstream-stable: released (3.2.63) [isofs-fix-unbounded-recursion-when-processing-relocated-directories.patch]
More information about the kernel-sec-discuss
mailing list