[kernel-sec-discuss] r3759 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sun Apr 26 11:52:22 UTC 2015


Author: carnil
Date: 2015-04-26 11:52:22 +0000 (Sun, 26 Apr 2015)
New Revision: 3759

Modified:
   active/CVE-2014-8159
   active/CVE-2014-9715
   active/CVE-2015-2041
   active/CVE-2015-2042
   active/CVE-2015-2150
   active/CVE-2015-2830
   active/CVE-2015-2922
   active/CVE-2015-3331
   active/CVE-2015-3339
Log:
Mark 3.2.68-1+deb7u1 as released

Modified: active/CVE-2014-8159
===================================================================
--- active/CVE-2014-8159	2015-04-24 15:21:18 UTC (rev 3758)
+++ active/CVE-2014-8159	2015-04-26 11:52:22 UTC (rev 3759)
@@ -7,7 +7,7 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt9-1) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
 3.16-jessie-security: N/A "Fixed before initial release"
-3.2-wheezy-security: pending (3.2.68-1+deb7u1) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
 3.16-upstream-stable: pending (3.16.7-ckt10)
 3.2-upstream-stable: needed

Modified: active/CVE-2014-9715
===================================================================
--- active/CVE-2014-9715	2015-04-24 15:21:18 UTC (rev 3758)
+++ active/CVE-2014-9715	2015-04-26 11:52:22 UTC (rev 3759)
@@ -9,7 +9,7 @@
 2.6.32-upstream-stable: N/A "Introduced in 3.6"
 sid: released (3.14.5-1)
 3.16-jessie-security: N/A "Fixed before initial release"
-3.2-wheezy-security: pending (3.2.68-1+deb7u1) [bugfix/all/netfilter-nf_conntrack-reserve-two-bytes-for-nf_ct_e.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/all/netfilter-nf_conntrack-reserve-two-bytes-for-nf_ct_e.patch]
 2.6.32-squeeze-security: N/A "Introduced in 3.6"
 3.16-upstream-stable: N/A "Fixed already in v3.15-rc1"
 3.2-upstream-stable: needed

Modified: active/CVE-2015-2041
===================================================================
--- active/CVE-2015-2041	2015-04-24 15:21:18 UTC (rev 3758)
+++ active/CVE-2015-2041	2015-04-26 11:52:22 UTC (rev 3759)
@@ -8,7 +8,7 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt9-1)
 3.16-jessie-security: N/A "Fixed before initial release"
-3.2-wheezy-security: pending (3.2.68-1+deb7u1) [bugfix/all/net-llc-use-correct-size-for-sysctl-timeout-entries.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/all/net-llc-use-correct-size-for-sysctl-timeout-entries.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/net-llc-use-correct-size-for-sysctl-timeout-entries.patch]
 3.16-upstream-stable: released (3.16.7-ckt8)
 3.2-upstream-stable: needed

Modified: active/CVE-2015-2042
===================================================================
--- active/CVE-2015-2042	2015-04-24 15:21:18 UTC (rev 3758)
+++ active/CVE-2015-2042	2015-04-26 11:52:22 UTC (rev 3759)
@@ -8,7 +8,7 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt9-1)
 3.16-jessie-security: N/A "Fixed before initial release"
-3.2-wheezy-security: pending (3.2.68-1+deb7u1) [bugfix/all/net-rds-use-correct-size-for-max-unacked-packets-and.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/all/net-rds-use-correct-size-for-max-unacked-packets-and.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/net-rds-use-correct-size-for-max-unacked-packets-and.patch]
 3.16-upstream-stable: released (3.16.7-ckt8)
 3.2-upstream-stable: needed

Modified: active/CVE-2015-2150
===================================================================
--- active/CVE-2015-2150	2015-04-24 15:21:18 UTC (rev 3758)
+++ active/CVE-2015-2150	2015-04-26 11:52:22 UTC (rev 3759)
@@ -7,7 +7,7 @@
 2.6.32-upstream-stable: N/A "xen-pciback introduced in 3.1"
 sid: released (3.16.7-ckt9-1)
 3.16-jessie-security: N/A "Fixed before initial release"
-3.2-wheezy-security: pending (3.2.68-1+deb7u1) [bugfix/all/xen-pciback-limit-guest-control-of-command-register.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/all/xen-pciback-limit-guest-control-of-command-register.patch]
 2.6.32-squeeze-security: N/A "xen-pciback introduced in 3.1"
 3.16-upstream-stable: released (3.16.7-ckt9)
 3.2-upstream-stable: needed

Modified: active/CVE-2015-2830
===================================================================
--- active/CVE-2015-2830	2015-04-24 15:21:18 UTC (rev 3758)
+++ active/CVE-2015-2830	2015-04-26 11:52:22 UTC (rev 3759)
@@ -6,7 +6,7 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt9-1)
 3.16-jessie-security: N/A "Fixed before initial release"
-3.2-wheezy-security: pending (3.2.68-1+deb7u1) [bugfix/x86/x86-asm-entry-64-remove-a-bogus-ret_from_fork-optimi.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/x86/x86-asm-entry-64-remove-a-bogus-ret_from_fork-optimi.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/x86/x86-asm-entry-64-remove-a-bogus-ret_from_fork-optimi.patch]
 3.16-upstream-stable: released (3.16.7-ckt9)
 3.2-upstream-stable: needed

Modified: active/CVE-2015-2922
===================================================================
--- active/CVE-2015-2922	2015-04-24 15:21:18 UTC (rev 3758)
+++ active/CVE-2015-2922	2015-04-26 11:52:22 UTC (rev 3759)
@@ -6,7 +6,7 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt9-1) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
 3.16-jessie-security: N/A "Fixed before initial release"
-3.2-wheezy-security: pending (3.2.68-1+deb7u1) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
 3.16-upstream-stable: pending (3.16.7-ckt10)
 3.2-upstream-stable: needed

Modified: active/CVE-2015-3331
===================================================================
--- active/CVE-2015-3331	2015-04-24 15:21:18 UTC (rev 3758)
+++ active/CVE-2015-3331	2015-04-26 11:52:22 UTC (rev 3759)
@@ -7,7 +7,7 @@
 2.6.32-upstream-stable: N/A "Introduced in v2.6.38-rc1 with 0bd82f5f6355775fbaf7d3c664432ce1b862be1e"
 sid: released (3.16.7-ckt9-3) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
 3.16-jessie-security: pending (3.16.7-ckt9-3~deb8u1) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
-3.2-wheezy-security: pending (3.2.68-1~deb7u1) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
 2.6.32-squeeze-security: N/A "Introduced in v2.6.38-rc1 with 0bd82f5f6355775fbaf7d3c664432ce1b862be1e"
 3.16-upstream-stable: pending (3.16.7-ckt10)
 3.2-upstream-stable: needed

Modified: active/CVE-2015-3339
===================================================================
--- active/CVE-2015-3339	2015-04-24 15:21:18 UTC (rev 3758)
+++ active/CVE-2015-3339	2015-04-26 11:52:22 UTC (rev 3759)
@@ -6,7 +6,7 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt9-3) [bugfix/all/fs-take-i_mutex-during-prepare_binprm-for-set-ug-id-.patch]
 3.16-jessie-security: pending (3.16.7-ckt9-3~deb8u1) [bugfix/all/fs-take-i_mutex-during-prepare_binprm-for-set-ug-id-.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u1) [bugfix/all/fs-take-i_mutex-during-prepare_binprm-for-set-ug-id-.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/all/fs-take-i_mutex-during-prepare_binprm-for-set-ug-id-.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list