[kernel-sec-discuss] r3697 - active
Ben Hutchings
benh at moszumanska.debian.org
Tue Feb 24 00:19:11 UTC 2015
Author: benh
Date: 2015-02-24 00:19:11 +0000 (Tue, 24 Feb 2015)
New Revision: 3697
Modified:
active/CVE-2013-7421
active/CVE-2014-7822
active/CVE-2014-8160
active/CVE-2014-8559
active/CVE-2014-9585
active/CVE-2014-9644
active/CVE-2014-9683
active/CVE-2015-0239
active/CVE-2015-1420
active/CVE-2015-1421
active/CVE-2015-1593
Log:
Mark 3.2.65-1+deb7u2 as released
Modified: active/CVE-2013-7421
===================================================================
--- active/CVE-2013-7421 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2013-7421 2015-02-24 00:19:11 UTC (rev 3697)
@@ -7,7 +7,7 @@
upstream: released (3.19-rc6) [5d26a105b5a73e5635eae0629b42fa0a90e07b7b, 4943ba16bbc2db05115707b3ff7b4874e9e3c560, 3e14dcf7cb80b34a1f38b55bc96f02d23fdaaaaf]
2.6.32-upstream-stable: N/A "Introduced in 2.6.38"
sid: released (3.16.7-ckt4-2) [bugfix/all/crypto-prefix-module-autoloading-with-crypto.patch, bugfix/all/crypto-include-crypto-module-prefix-in-template.patch, +bugfix/all/crypto-add-missing-crypto-module-aliases.patch]
-3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/crypto-prefix-module-autoloading-with-crypto.patch, bugfix/all/crypto-include-crypto-module-prefix-in-template.patch, +bugfix/all/crypto-add-missing-crypto-module-aliases.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/crypto-prefix-module-autoloading-with-crypto.patch, bugfix/all/crypto-include-crypto-module-prefix-in-template.patch, +bugfix/all/crypto-add-missing-crypto-module-aliases.patch]
2.6.32-squeeze-security: N/A "Introduced in 2.6.38"
3.16-upstream-stable: released (3.16.7-ckt6)
3.2-upstream-stable: released (3.2.67) [crypto-prefix-module-autoloading-with-crypto.patch, crypto-include-crypto-module-prefix-in-template.patch, crypto-add-missing-crypto-module-aliases.patch]
Modified: active/CVE-2014-7822
===================================================================
--- active/CVE-2014-7822 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2014-7822 2015-02-24 00:19:11 UTC (rev 3697)
@@ -9,7 +9,7 @@
upstream: released (v3.16-rc1) [8d0207652cbe27d1f962050737848e5ad4671958]
2.6.32-upstream-stable: needed
sid: released (3.16.2-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/splice-apply-generic-position-and-size-checks-to-eac.patch]
3.16-upstream-stable: N/A "fixed before 3.16"
3.2-upstream-stable: released (3.2.67) [splice-apply-generic-position-and-size-checks-to-eac.patch]
Modified: active/CVE-2014-8160
===================================================================
--- active/CVE-2014-8160 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2014-8160 2015-02-24 00:19:11 UTC (rev 3697)
@@ -6,7 +6,7 @@
upstream: released (3.18) [db29a9508a9246e77087c5531e45b2c88ec6988b]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
-3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
3.16-upstream-stable: released (3.16.7-ckt5)
3.2-upstream-stable: released (3.2.67) [netfilter-conntrack-disable-generic-tracking-for-kno.patch]
Modified: active/CVE-2014-8559
===================================================================
--- active/CVE-2014-8559 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2014-8559 2015-02-24 00:19:11 UTC (rev 3697)
@@ -14,7 +14,7 @@
upstream: released (3.19-rc1) [946e51f2bf37f1656916eb75bd0742ba33983c28, ca5358ef75fc69fee5322a38a340f5739d997c10]
2.6.32-upstream-stable: N/A
sid: released (3.16.7-ckt4-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/move-d_rcu-from-overlapping-d_child-to-overlapping-d_alias.patch, bugfix/all/deal-with-deadlock-in-d_walk.patch, bugfix/all/dcache-fix-locking-bugs-in-backported-deal-with-deadlock-in-d_walk.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/move-d_rcu-from-overlapping-d_child-to-overlapping-d_alias.patch, bugfix/all/deal-with-deadlock-in-d_walk.patch, bugfix/all/dcache-fix-locking-bugs-in-backported-deal-with-deadlock-in-d_walk.patch]
2.6.32-squeeze-security: N/A
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: released (3.2.66) [move-d_rcu-from-overlapping-d_child-to-overlapping-d_alias.patch, deal-with-deadlock-in-d_walk.patch]
Modified: active/CVE-2014-9585
===================================================================
--- active/CVE-2014-9585 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2014-9585 2015-02-24 00:19:11 UTC (rev 3697)
@@ -6,7 +6,7 @@
upstream: released (3.19-rc4) [394f56fe480140877304d342dec46d50dc823d46]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
-3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
3.16-upstream-stable: released (3.16.7-ckt5)
3.2-upstream-stable: released (3.2.67) [x86_64-vdso-fix-the-vdso-address-randomization-algorithm.patch]
Modified: active/CVE-2014-9644
===================================================================
--- active/CVE-2014-9644 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2014-9644 2015-02-24 00:19:11 UTC (rev 3697)
@@ -7,7 +7,7 @@
upstream: released (3.19-rc6) [5d26a105b5a73e5635eae0629b42fa0a90e07b7b, 4943ba16bbc2db05115707b3ff7b4874e9e3c560, 3e14dcf7cb80b34a1f38b55bc96f02d23fdaaaaf]
2.6.32-upstream-stable: N/A "Introduced in 2.6.38"
sid: released (3.16.7-ckt4-2) [bugfix/all/crypto-prefix-module-autoloading-with-crypto.patch, bugfix/all/crypto-include-crypto-module-prefix-in-template.patch, +bugfix/all/crypto-add-missing-crypto-module-aliases.patch]
-3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/crypto-prefix-module-autoloading-with-crypto.patch, bugfix/all/crypto-include-crypto-module-prefix-in-template.patch, +bugfix/all/crypto-add-missing-crypto-module-aliases.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/crypto-prefix-module-autoloading-with-crypto.patch, bugfix/all/crypto-include-crypto-module-prefix-in-template.patch, +bugfix/all/crypto-add-missing-crypto-module-aliases.patch]
2.6.32-squeeze-security: N/A "Introduced in 2.6.38"
3.16-upstream-stable: released (3.16.7-ckt6)
3.2-upstream-stable: released (3.2.67) [crypto-prefix-module-autoloading-with-crypto.patch, crypto-include-crypto-module-prefix-in-template.patch, crypto-add-missing-crypto-module-aliases.patch]
Modified: active/CVE-2014-9683
===================================================================
--- active/CVE-2014-9683 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2014-9683 2015-02-24 00:19:11 UTC (rev 3697)
@@ -5,7 +5,7 @@
upstream: released (v3.19-rc1) [942080643bce061c3dd9d5718d3b745dcb39a8bc]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u2)
+3.2-wheezy-security: released (3.2.65-1+deb7u2)
2.6.32-squeeze-security: needed
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: released (3.2.67)
Modified: active/CVE-2015-0239
===================================================================
--- active/CVE-2015-0239 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2015-0239 2015-02-24 00:19:11 UTC (rev 3697)
@@ -10,7 +10,7 @@
upstream: released (3.19-rc6) [f3747379accba8e95d70cec0eae0582c8c182050]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-2) [bugfix/x86/kvm-x86-sysenter-emulation-is-broken.patch]
-3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/x86/kvm-x86-sysenter-emulation-is-broken.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/x86/kvm-x86-sysenter-emulation-is-broken.patch]
2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
3.16-upstream-stable: released (3.16.7-ckt6)
3.2-upstream-stable: released (3.2.67) [kvm-x86-sysenter-emulation-is-broken.patch]
Modified: active/CVE-2015-1420
===================================================================
--- active/CVE-2015-1420 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2015-1420 2015-02-24 00:19:11 UTC (rev 3697)
@@ -6,7 +6,7 @@
upstream: needed
2.6.32-upstream-stable: N/A "Introduced in 2.6.39 with becfd1f37544798cbdfd788f32c827160fab98c1"
sid: pending (3.16.7-ckt6-1) [bugfix/all/vfs-read-file_handle-only-once-in-handle_to_path.patch]
-3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/vfs-read-file_handle-only-once-in-handle_to_path.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/vfs-read-file_handle-only-once-in-handle_to_path.patch]
2.6.32-squeeze-security: N/A "Introduced in 2.6.39 with becfd1f37544798cbdfd788f32c827160fab98c1"
3.16-upstream-stable: needed
3.2-upstream-stable: needed
Modified: active/CVE-2015-1421
===================================================================
--- active/CVE-2015-1421 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2015-1421 2015-02-24 00:19:11 UTC (rev 3697)
@@ -7,7 +7,7 @@
upstream: released (3.19-rc7) [600ddd6825543962fb807884169e57b580dba208]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-3) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
-3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]
2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch]
3.16-upstream-stable: released (3.16.7-ckt6)
3.2-upstream-stable: released (3.2.67) [net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]
Modified: active/CVE-2015-1593
===================================================================
--- active/CVE-2015-1593 2015-02-23 10:19:49 UTC (rev 3696)
+++ active/CVE-2015-1593 2015-02-24 00:19:11 UTC (rev 3697)
@@ -8,7 +8,7 @@
upstream: released (4.0-rc1) [4e7c22d447bb6d7e37bfe39ff658486ae78e8d77]
2.6.32-upstream-stable: needed
sid: pending (3.16.7-ckt6-1) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch]
-3.2-wheezy-security: pending (3.2.65-1+deb7u2) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch]
2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/aslr-fix-stack-randomization-on-64-bit-systems.patch]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list