[kernel-sec-discuss] r3560 - active retired
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Mon Nov 24 08:39:22 UTC 2014
Author: jmm
Date: 2014-11-24 08:36:58 +0000 (Mon, 24 Nov 2014)
New Revision: 3560
Modified:
active/CVE-2014-4508
active/CVE-2014-5077
active/CVE-2014-5471
active/CVE-2014-5472
retired/CVE-2014-3145
Log:
fixes from 2.6.32.64
Modified: active/CVE-2014-4508
===================================================================
--- active/CVE-2014-4508 2014-11-24 08:26:42 UTC (rev 3559)
+++ active/CVE-2014-4508 2014-11-24 08:36:58 UTC (rev 3560)
@@ -4,7 +4,7 @@
Notes:
Bugs:
upstream: released (3.16-rc3) [554086d85e71f30abe46fc014fea31929a7c6a8a]
-2.6.32-upstream-stable: pending (2.6.32.64)
+2.6.32-upstream-stable: released (2.6.32.64)
sid: released (3.14.9-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch]
3.2-wheezy-security: released (3.2.60-1) [bugfix/x86/x86_32-entry-Do-syscall-exit-work-on-badsys-CVE-2014.patch]
3.16-upstream-stable: N/A
Modified: active/CVE-2014-5077
===================================================================
--- active/CVE-2014-5077 2014-11-24 08:26:42 UTC (rev 3559)
+++ active/CVE-2014-5077 2014-11-24 08:36:58 UTC (rev 3560)
@@ -6,7 +6,7 @@
bwh> ('[SCTP]: Implete SCTP-AUTH parameter processing') i.e. in 2.6.24.
Bugs:
upstream: released (3.16) [1be9a950c646c9092fb3618197f7b6bfb50e82aa]
-2.6.32-upstream-stable: pending (2.6.32.64)
+2.6.32-upstream-stable: released (2.6.32.64)
sid: released (3.14.15-1) [bugfix/all/net-sctp-inherit-auth_capable-on-INIT-collisions.patch]
3.2-wheezy-security: released (3.2.63-1)
3.16-upstream-stable: N/A
Modified: active/CVE-2014-5471
===================================================================
--- active/CVE-2014-5471 2014-11-24 08:26:42 UTC (rev 3559)
+++ active/CVE-2014-5471 2014-11-24 08:36:58 UTC (rev 3560)
@@ -3,7 +3,7 @@
Notes:
Bugs:
upstream: released (v3.17-rc2) [410dd3cf4c9b36f27ed4542ee18b1af5e68645a4]
-2.6.32-upstream-stable: pending (2.6.32.64)
+2.6.32-upstream-stable: released (2.6.32.64)
sid: released (3.16.2-2)
3.2-wheezy-security: released (3.2.63-1)
2.6.32-squeeze-security: needed
Modified: active/CVE-2014-5472
===================================================================
--- active/CVE-2014-5472 2014-11-24 08:26:42 UTC (rev 3559)
+++ active/CVE-2014-5472 2014-11-24 08:36:58 UTC (rev 3560)
@@ -3,7 +3,7 @@
Notes:
Bugs:
upstream: released (v3.17-rc2) [410dd3cf4c9b36f27ed4542ee18b1af5e68645a4]
-2.6.32-upstream-stable: pending (2.6.32.64)
+2.6.32-upstream-stable: released (2.6.32.64)
sid: released (3.16.2-2)
3.2-wheezy-security: released (3.2.63-1)
2.6.32-squeeze-security: needed
Modified: retired/CVE-2014-3145
===================================================================
--- retired/CVE-2014-3145 2014-11-24 08:26:42 UTC (rev 3559)
+++ retired/CVE-2014-3145 2014-11-24 08:36:58 UTC (rev 3560)
@@ -4,7 +4,7 @@
Notes:
Bugs:
upstream: released (v3.15-rc2) [05ab8f2647e4221cbdb3856dd7d32bd5407316b3]
-2.6.32-upstream-stable: pending (2.6.32.64)
+2.6.32-upstream-stable: released (2.6.32.64)
sid: released (3.14.4-1) [bugfix/all/filter-prevent-nla-extensions-to-peek-beyond-the-end.patch]
3.2-wheezy-security: released (3.2.57-3+deb7u2) [bugfix/all/filter-prevent-nla-extensions-to-peek-beyond-the-end.patch]
2.6.32-squeeze-security: released (2.6.32-48squeeze8)
More information about the kernel-sec-discuss
mailing list