[kernel-sec-discuss] r3548 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Nov 17 18:38:06 UTC 2014


Author: jmm
Date: 2014-11-17 18:38:06 +0000 (Mon, 17 Nov 2014)
New Revision: 3548

Modified:
   active/CVE-2014-4508
   active/CVE-2014-5077
   active/CVE-2014-5471
   active/CVE-2014-5472
Log:
fixes pending for 2.6.32.64


Modified: active/CVE-2014-4508
===================================================================
--- active/CVE-2014-4508	2014-11-14 21:31:26 UTC (rev 3547)
+++ active/CVE-2014-4508	2014-11-17 18:38:06 UTC (rev 3548)
@@ -4,9 +4,9 @@
 Notes:
 Bugs:
 upstream: released (3.16-rc3) [554086d85e71f30abe46fc014fea31929a7c6a8a]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending (2.6.32.64)
 sid: released (3.14.9-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch]
 3.2-wheezy-security: released (3.2.60-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch]
 3.16-upstream-stable: N/A
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
 3.2-upstream-stable: released (3.2.61) [x86_32-entry-do-syscall-exit-work-on-badsys-cve-2014-4508.patch]

Modified: active/CVE-2014-5077
===================================================================
--- active/CVE-2014-5077	2014-11-14 21:31:26 UTC (rev 3547)
+++ active/CVE-2014-5077	2014-11-17 18:38:06 UTC (rev 3548)
@@ -6,7 +6,7 @@
  bwh> ('[SCTP]: Implete SCTP-AUTH parameter processing') i.e. in 2.6.24.
 Bugs:
 upstream: released (3.16) [1be9a950c646c9092fb3618197f7b6bfb50e82aa]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.64)
 sid: released (3.14.15-1) [bugfix/all/net-sctp-inherit-auth_capable-on-INIT-collisions.patch]
 3.2-wheezy-security: released (3.2.63-1)
 3.16-upstream-stable: N/A

Modified: active/CVE-2014-5471
===================================================================
--- active/CVE-2014-5471	2014-11-14 21:31:26 UTC (rev 3547)
+++ active/CVE-2014-5471	2014-11-17 18:38:06 UTC (rev 3548)
@@ -3,9 +3,9 @@
 Notes:
 Bugs:
 upstream: released (v3.17-rc2) [410dd3cf4c9b36f27ed4542ee18b1af5e68645a4]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending (2.6.32.64)
 sid: released (3.16.2-2)
 3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.2)
 3.2-upstream-stable: released (3.2.63) [isofs-fix-unbounded-recursion-when-processing-relocated-directories.patch]

Modified: active/CVE-2014-5472
===================================================================
--- active/CVE-2014-5472	2014-11-14 21:31:26 UTC (rev 3547)
+++ active/CVE-2014-5472	2014-11-17 18:38:06 UTC (rev 3548)
@@ -3,9 +3,9 @@
 Notes:
 Bugs:
 upstream: released (v3.17-rc2) [410dd3cf4c9b36f27ed4542ee18b1af5e68645a4]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending (2.6.32.64)
 sid: released (3.16.2-2)
 3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.2)
 3.2-upstream-stable: released (3.2.63) [isofs-fix-unbounded-recursion-when-processing-relocated-directories.patch]




More information about the kernel-sec-discuss mailing list