[kernel-sec-discuss] r3549 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed Nov 19 21:21:25 UTC 2014


Author: jmm
Date: 2014-11-19 21:21:25 +0000 (Wed, 19 Nov 2014)
New Revision: 3549

Modified:
   active/CVE-2014-3610
   active/CVE-2014-3611
   active/CVE-2014-3646
   active/CVE-2014-3647
   active/CVE-2014-3673
   active/CVE-2014-3687
   active/CVE-2014-3688
   active/CVE-2014-7825
   active/CVE-2014-7826
   active/CVE-2014-7970
   active/CVE-2014-8086
   active/CVE-2014-8369
Log:
fixes from 3.16.7


Modified: active/CVE-2014-3610
===================================================================
--- active/CVE-2014-3610	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-3610	2014-11-19 21:21:25 UTC (rev 3549)
@@ -7,5 +7,5 @@
 sid: released (3.16.7-1) [bugfix/x86/KVM-x86-Check-non-canonical-addresses-upon-WRMSR.patch, bugfix/x86/KVM-x86-Prevent-host-from-panicking-on-shared-MSR-wr.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/x86/KVM-x86-Check-non-canonical-addresses-upon-WRMSR.patch]
 2.6.32-squeeze-security:
-3.16-upstream-stable:
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: released (3.2.64)

Modified: active/CVE-2014-3611
===================================================================
--- active/CVE-2014-3611	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-3611	2014-11-19 21:21:25 UTC (rev 3549)
@@ -7,5 +7,5 @@
 sid: released (3.16.7-1) [bugfix/x86/KVM-x86-Improve-thread-safety-in-pit.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/x86/KVM-x86-Improve-thread-safety-in-pit.patch]
 2.6.32-squeeze-security:
-3.16-upstream-stable:
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: released (3.2.64)

Modified: active/CVE-2014-3646
===================================================================
--- active/CVE-2014-3646	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-3646	2014-11-19 21:21:25 UTC (rev 3549)
@@ -7,5 +7,5 @@
 sid: released (3.16.7-1) [bugfix/x86/kvm-vmx-handle-invvpid-vm-exit-gracefully.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/x86/kvm-vmx-handle-invvpid-vm-exit-gracefully.patch]
 2.6.32-squeeze-security:
-3.16-upstream-stable:
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: released (3.2.64)

Modified: active/CVE-2014-3647
===================================================================
--- active/CVE-2014-3647	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-3647	2014-11-19 21:21:25 UTC (rev 3549)
@@ -7,5 +7,5 @@
 sid: released (3.16.7-1) [bugfix/x86/KVM-x86-Fix-wrong-masking-on-relative-jump-call.patch, bugfix/x86/KVM-x86-Emulator-fixes-for-eip-canonical-checks-on-n.patch, bugfix/x86/KVM-x86-Handle-errors-when-RIP-is-set-during-far-jum.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/x86/KVM-x86-emulator-Use-opcode-execute-for-CALL.patch, bugfix/x86/KVM-x86-Fix-wrong-masking-on-relative-jump-call.patch, bugfix/x86/KVM-x86-Emulator-fixes-for-eip-canonical-checks-on-n.patch, bugfix/x86/KVM-x86-use-new-CS.RPL-as-CPL-during-task-switch.patch, bugfix/x86/KVM-x86-Handle-errors-when-RIP-is-set-during-far-jum.patch]
 2.6.32-squeeze-security:
-3.16-upstream-stable:
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: released (3.2.64)

Modified: active/CVE-2014-3673
===================================================================
--- active/CVE-2014-3673	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-3673	2014-11-19 21:21:25 UTC (rev 3549)
@@ -7,5 +7,5 @@
 sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-skb_over_panic-when-receiving-malformed.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/all/net-sctp-fix-skb_over_panic-when-receiving-malformed.patch]
 2.6.32-squeeze-security:
-3.16-upstream-stable:
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: released (3.2.64)

Modified: active/CVE-2014-3687
===================================================================
--- active/CVE-2014-3687	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-3687	2014-11-19 21:21:25 UTC (rev 3549)
@@ -7,5 +7,5 @@
 sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [debian/patches/bugfix/all/net-sctp-fix-panic-on-duplicate-ASCONF-chunks.patch]
 2.6.32-squeeze-security:
-3.16-upstream-stable:
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: released (3.2.64)

Modified: active/CVE-2014-3688
===================================================================
--- active/CVE-2014-3688	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-3688	2014-11-19 21:21:25 UTC (rev 3549)
@@ -7,5 +7,5 @@
 sid: released (3.16.7-1) [bugfix/all/net-sctp-fix-remote-memory-pressure-from-excessive-q.patch]
 3.2-wheezy-security: released (3.2.63-2+deb7u1) [bugfix/all/net-sctp-fix-remote-memory-pressure-from-excessive-q.patch]
 2.6.32-squeeze-security:
-3.16-upstream-stable:
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: released (3.2.64)

Modified: active/CVE-2014-7825
===================================================================
--- active/CVE-2014-7825	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-7825	2014-11-19 21:21:25 UTC (rev 3549)
@@ -5,8 +5,8 @@
 Bugs:
 upstream: [086ba77a6db00ed858ff07451bedee197df868c9] (v3.18-rc3)
 2.6.32-upstream-stable:
-sid:
+sid: needed
 3.2-wheezy-security:
 2.6.32-squeeze-security:
-3.16-upstream-stable:
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable:

Modified: active/CVE-2014-7826
===================================================================
--- active/CVE-2014-7826	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-7826	2014-11-19 21:21:25 UTC (rev 3549)
@@ -6,8 +6,8 @@
 Bugs:
 upstream: [086ba77a6db00ed858ff07451bedee197df868c9] (v3.18-rc3)
 2.6.32-upstream-stable:
-sid:
+sid: needed
 3.2-wheezy-security:
 2.6.32-squeeze-security:
-3.16-upstream-stable:
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable:

Modified: active/CVE-2014-7970
===================================================================
--- active/CVE-2014-7970	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-7970	2014-11-19 21:21:25 UTC (rev 3549)
@@ -8,5 +8,5 @@
 sid: released (3.16.7-1) [bugfix/all/mnt-Prevent-pivot_root-from-creating-a-loop-in-the-m.patch]
 3.2-wheezy-security: N/A "User namespaces not usable"
 2.6.32-squeeze-security: N/A "User namespaces not usable"
-3.16-upstream-stable: needed
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: N/A "User namespaces not usable"

Modified: active/CVE-2014-8086
===================================================================
--- active/CVE-2014-8086	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-8086	2014-11-19 21:21:25 UTC (rev 3549)
@@ -5,8 +5,8 @@
 Bugs:
 upstream: released (3.18-rc3) [a41537e69b4aa43f0fea02498c2595a81267383b]
 2.6.32-upstream-stable:
-sid:
+sid: needed
 3.2-wheezy-security:
 2.6.32-squeeze-security:
-3.16-upstream-stable:
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable:

Modified: active/CVE-2014-8369
===================================================================
--- active/CVE-2014-8369	2014-11-17 18:38:06 UTC (rev 3548)
+++ active/CVE-2014-8369	2014-11-19 21:21:25 UTC (rev 3549)
@@ -9,5 +9,5 @@
 sid: needed
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: N/A "Broken patch was never applied"
-3.16-upstream-stable: needed
+3.16-upstream-stable: released (3.16.7-ckt1)
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list