[kernel-sec-discuss] r4036 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Dec 7 07:04:41 UTC 2015


Author: jmm
Date: 2015-12-07 07:04:41 +0000 (Mon, 07 Dec 2015)
New Revision: 4036

Modified:
   active/CVE-2013-7446
   active/CVE-2015-7799
   active/CVE-2015-7833
   active/CVE-2015-7990
   active/CVE-2015-8324
Log:
fixes from 2.6.32-48squeeze17


Modified: active/CVE-2013-7446
===================================================================
--- active/CVE-2013-7446	2015-12-07 01:22:15 UTC (rev 4035)
+++ active/CVE-2013-7446	2015-12-07 07:04:41 UTC (rev 4036)
@@ -13,4 +13,4 @@
 sid: released (4.2.6-2) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u1) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
 3.2-wheezy-security: pending (3.2.73-2+deb7u1) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze17) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]

Modified: active/CVE-2015-7799
===================================================================
--- active/CVE-2015-7799	2015-12-07 01:22:15 UTC (rev 4035)
+++ active/CVE-2015-7799	2015-12-07 07:04:41 UTC (rev 4036)
@@ -10,4 +10,4 @@
 sid: released (4.2.6-2) [bugfix/all/isdn_ppp-add-checks-for-allocation-failure-in-isdn_p.patch, bugfix/all/ppp-slip-validate-vj-compression-slot-parameters-com.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u1)
 3.2-wheezy-security: pending (3.2.73-2+deb7u1) [bugfix/all/isdn_ppp-add-checks-for-allocation-failure-in-isdn_p.patch, bugfix/all/ppp-slip-validate-vj-compression-slot-parameters-com.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/isdn_ppp-add-checks-for-allocation-failure-in-isdn_p.patch, bugfix/all/ppp-slip-validate-vj-compression-slot-parameters-com.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze17) [bugfix/all/isdn_ppp-add-checks-for-allocation-failure-in-isdn_p.patch, bugfix/all/ppp-slip-validate-vj-compression-slot-parameters-com.patch]

Modified: active/CVE-2015-7833
===================================================================
--- active/CVE-2015-7833	2015-12-07 01:22:15 UTC (rev 4035)
+++ active/CVE-2015-7833	2015-12-07 07:04:41 UTC (rev 4036)
@@ -13,4 +13,4 @@
 sid: released (4.2.6-2) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, media-usbvision-fix-crash-on-detecting-device-with-i.patch]
 3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u7) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, media-usbvision-fix-crash-on-detecting-device-with-i.patch]
 3.2-wheezy-security: pending (3.2.68-1+deb7u7) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, media-usbvision-fix-crash-on-detecting-device-with-i.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, media-usbvision-fix-crash-on-detecting-device-with-i.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze17) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, media-usbvision-fix-crash-on-detecting-device-with-i.patch]

Modified: active/CVE-2015-7990
===================================================================
--- active/CVE-2015-7990	2015-12-07 01:22:15 UTC (rev 4035)
+++ active/CVE-2015-7990	2015-12-07 07:04:41 UTC (rev 4036)
@@ -10,4 +10,4 @@
 sid: released (4.2.6-1) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze17) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]

Modified: active/CVE-2015-8324
===================================================================
--- active/CVE-2015-8324	2015-12-07 01:22:15 UTC (rev 4035)
+++ active/CVE-2015-8324	2015-12-07 07:04:41 UTC (rev 4036)
@@ -9,4 +9,4 @@
 sid: released (2.6.37-1)
 3.16-jessie-security: N/A "Fixed before 3.16"
 3.2-wheezy-security: N/A "Fixed before 3.2"
-2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/ext4-fix-null-dereference-in-ext4_fill_super.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze17) [bugfix/all/ext4-fix-null-dereference-in-ext4_fill_super.patch]




More information about the kernel-sec-discuss mailing list