[kernel-sec-discuss] r3686 - active
Ben Hutchings
benh at moszumanska.debian.org
Wed Feb 18 23:27:01 UTC 2015
Author: benh
Date: 2015-02-18 23:27:00 +0000 (Wed, 18 Feb 2015)
New Revision: 3686
Modified:
active/CVE-2013-6885
active/CVE-2014-7822
active/CVE-2014-8133
active/CVE-2014-8134
active/CVE-2014-8160
active/CVE-2014-9420
active/CVE-2014-9584
active/CVE-2014-9585
active/CVE-2015-1421
active/CVE-2015-1593
Log:
Mark 2.6.32-48squeeze11 as released
Modified: active/CVE-2013-6885
===================================================================
--- active/CVE-2013-6885 2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2013-6885 2015-02-18 23:27:00 UTC (rev 3686)
@@ -6,6 +6,6 @@
2.6.32-upstream-stable: needed
sid: released (3.14.2-1)
3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
3.16-upstream-stable: N/A "fixed before 3.16"
3.2-upstream-stable: pending (3.2.67) [x86-cpu-amd-add-workaround-for-family-16h-erratum-793.patch]
Modified: active/CVE-2014-7822
===================================================================
--- active/CVE-2014-7822 2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-7822 2015-02-18 23:27:00 UTC (rev 3686)
@@ -10,6 +10,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.2-1)
3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
3.16-upstream-stable: N/A "fixed before 3.16"
3.2-upstream-stable: pending (3.2.67) [splice-apply-generic-position-and-size-checks-to-eac.patch]
Modified: active/CVE-2014-8133
===================================================================
--- active/CVE-2014-8133 2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-8133 2015-02-18 23:27:00 UTC (rev 3686)
@@ -6,6 +6,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: released (3.2.66) [x86-tls-validate-tls-entries-to-protect-espfix.patch]
Modified: active/CVE-2014-8134
===================================================================
--- active/CVE-2014-8134 2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-8134 2015-02-18 23:27:00 UTC (rev 3686)
@@ -9,6 +9,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: released (3.2.66) [x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
Modified: active/CVE-2014-8160
===================================================================
--- active/CVE-2014-8160 2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-8160 2015-02-18 23:27:00 UTC (rev 3686)
@@ -7,6 +7,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
3.16-upstream-stable: released (3.16.7-ckt5)
3.2-upstream-stable: pending (3.2.67) [netfilter-conntrack-disable-generic-tracking-for-kno.patch]
Modified: active/CVE-2014-9420
===================================================================
--- active/CVE-2014-9420 2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-9420 2015-02-18 23:27:00 UTC (rev 3686)
@@ -6,6 +6,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
3.2-wheezy-security: released (3.2.65-1) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: pending (3.2.67) [isofs-fix-infinite-looping-over-ce-entries.patch]
Modified: active/CVE-2014-9584
===================================================================
--- active/CVE-2014-9584 2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-9584 2015-02-18 23:27:00 UTC (rev 3686)
@@ -6,6 +6,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: pending (3.2.67) [isofs-fix-unchecked-printing-of-er-records.patch]
Modified: active/CVE-2014-9585
===================================================================
--- active/CVE-2014-9585 2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-9585 2015-02-18 23:27:00 UTC (rev 3686)
@@ -7,6 +7,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
3.16-upstream-stable: released (3.16.7-ckt5)
3.2-upstream-stable: pending (3.2.67) [x86_64-vdso-fix-the-vdso-address-randomization-algorithm.patch]
Modified: active/CVE-2015-1421
===================================================================
--- active/CVE-2015-1421 2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2015-1421 2015-02-18 23:27:00 UTC (rev 3686)
@@ -8,6 +8,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-3) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
3.16-upstream-stable: released (3.16.7-ckt6)
3.2-upstream-stable: pending (3.2.67) [net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]
Modified: active/CVE-2015-1593
===================================================================
--- active/CVE-2015-1593 2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2015-1593 2015-02-18 23:27:00 UTC (rev 3686)
@@ -9,6 +9,6 @@
2.6.32-upstream-stable: needed
sid: needed
3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list