[kernel-sec-discuss] r3686 - active

Ben Hutchings benh at moszumanska.debian.org
Wed Feb 18 23:27:01 UTC 2015


Author: benh
Date: 2015-02-18 23:27:00 +0000 (Wed, 18 Feb 2015)
New Revision: 3686

Modified:
   active/CVE-2013-6885
   active/CVE-2014-7822
   active/CVE-2014-8133
   active/CVE-2014-8134
   active/CVE-2014-8160
   active/CVE-2014-9420
   active/CVE-2014-9584
   active/CVE-2014-9585
   active/CVE-2015-1421
   active/CVE-2015-1593
Log:
Mark 2.6.32-48squeeze11 as released

Modified: active/CVE-2013-6885
===================================================================
--- active/CVE-2013-6885	2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2013-6885	2015-02-18 23:27:00 UTC (rev 3686)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.14.2-1)
 3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
 3.16-upstream-stable: N/A "fixed before 3.16"
 3.2-upstream-stable: pending (3.2.67) [x86-cpu-amd-add-workaround-for-family-16h-erratum-793.patch]

Modified: active/CVE-2014-7822
===================================================================
--- active/CVE-2014-7822	2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-7822	2015-02-18 23:27:00 UTC (rev 3686)
@@ -10,6 +10,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.2-1)
 3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
 3.16-upstream-stable: N/A "fixed before 3.16"
 3.2-upstream-stable: pending (3.2.67) [splice-apply-generic-position-and-size-checks-to-eac.patch]

Modified: active/CVE-2014-8133
===================================================================
--- active/CVE-2014-8133	2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-8133	2015-02-18 23:27:00 UTC (rev 3686)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: released (3.2.66) [x86-tls-validate-tls-entries-to-protect-espfix.patch]

Modified: active/CVE-2014-8134
===================================================================
--- active/CVE-2014-8134	2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-8134	2015-02-18 23:27:00 UTC (rev 3686)
@@ -9,6 +9,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: released (3.2.66) [x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]

Modified: active/CVE-2014-8160
===================================================================
--- active/CVE-2014-8160	2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-8160	2015-02-18 23:27:00 UTC (rev 3686)
@@ -7,6 +7,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
 3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
 3.16-upstream-stable: released (3.16.7-ckt5)
 3.2-upstream-stable: pending (3.2.67) [netfilter-conntrack-disable-generic-tracking-for-kno.patch]

Modified: active/CVE-2014-9420
===================================================================
--- active/CVE-2014-9420	2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-9420	2015-02-18 23:27:00 UTC (rev 3686)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: released (3.2.65-1) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: pending (3.2.67) [isofs-fix-infinite-looping-over-ce-entries.patch]

Modified: active/CVE-2014-9584
===================================================================
--- active/CVE-2014-9584	2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-9584	2015-02-18 23:27:00 UTC (rev 3686)
@@ -6,6 +6,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: pending (3.2.67) [isofs-fix-unchecked-printing-of-er-records.patch]

Modified: active/CVE-2014-9585
===================================================================
--- active/CVE-2014-9585	2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2014-9585	2015-02-18 23:27:00 UTC (rev 3686)
@@ -7,6 +7,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
 3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
 3.16-upstream-stable: released (3.16.7-ckt5)
 3.2-upstream-stable: pending (3.2.67) [x86_64-vdso-fix-the-vdso-address-randomization-algorithm.patch]

Modified: active/CVE-2015-1421
===================================================================
--- active/CVE-2015-1421	2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2015-1421	2015-02-18 23:27:00 UTC (rev 3686)
@@ -8,6 +8,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-3) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
 3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
 3.16-upstream-stable: released (3.16.7-ckt6)
 3.2-upstream-stable: pending (3.2.67) [net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]

Modified: active/CVE-2015-1593
===================================================================
--- active/CVE-2015-1593	2015-02-18 05:37:12 UTC (rev 3685)
+++ active/CVE-2015-1593	2015-02-18 23:27:00 UTC (rev 3686)
@@ -9,6 +9,6 @@
 2.6.32-upstream-stable: needed
 sid: needed
 3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list