[kernel-sec-discuss] r3659 - active
Ben Hutchings
benh at moszumanska.debian.org
Thu Jan 29 01:02:19 UTC 2015
Author: benh
Date: 2015-01-29 01:02:19 +0000 (Thu, 29 Jan 2015)
New Revision: 3659
Modified:
active/CVE-2013-6885
active/CVE-2014-8133
active/CVE-2014-8134
active/CVE-2014-8160
active/CVE-2014-9419
active/CVE-2014-9420
active/CVE-2014-9584
active/CVE-2014-9585
Log:
Mark issues pending/needed for 2.6.32
Modified: active/CVE-2013-6885
===================================================================
--- active/CVE-2013-6885 2015-01-29 01:00:24 UTC (rev 3658)
+++ active/CVE-2013-6885 2015-01-29 01:02:19 UTC (rev 3659)
@@ -6,6 +6,6 @@
2.6.32-upstream-stable: needed
sid: released (3.14.2-1)
3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
3.16-upstream-stable: N/A "fixed before 3.16"
3.2-upstream-stable: needed
Modified: active/CVE-2014-8133
===================================================================
--- active/CVE-2014-8133 2015-01-29 01:00:24 UTC (rev 3658)
+++ active/CVE-2014-8133 2015-01-29 01:02:19 UTC (rev 3659)
@@ -6,6 +6,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: released (3.2.66) [x86-tls-validate-tls-entries-to-protect-espfix.patch]
Modified: active/CVE-2014-8134
===================================================================
--- active/CVE-2014-8134 2015-01-29 01:00:24 UTC (rev 3658)
+++ active/CVE-2014-8134 2015-01-29 01:02:19 UTC (rev 3659)
@@ -9,6 +9,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: released (3.2.66) [x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
Modified: active/CVE-2014-8160
===================================================================
--- active/CVE-2014-8160 2015-01-29 01:00:24 UTC (rev 3658)
+++ active/CVE-2014-8160 2015-01-29 01:02:19 UTC (rev 3659)
@@ -4,9 +4,9 @@
Notes:
Bugs:
upstream: released (3.18) [db29a9508a9246e77087c5531e45b2c88ec6988b]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
3.16-upstream-stable:
3.2-upstream-stable:
Modified: active/CVE-2014-9419
===================================================================
--- active/CVE-2014-9419 2015-01-29 01:00:24 UTC (rev 3658)
+++ active/CVE-2014-9419 2015-01-29 01:02:19 UTC (rev 3659)
@@ -1,11 +1,15 @@
Description: x86_64: userspace address leak
References:
Notes:
+ bwh> This depends on fixes to FPU context management that have not been
+ bwh> applied to 2.6.32.y. We probably can't fix it there, except by
+ bwh> picking only commit b3b0870ef3ff ("i387: do not preload FPU state at
+ bwh> task switch time") which will hurt FP performance.
Bugs:
upstream: released (v3.19-rc1) [f647d7c155f069c1a068030255c300663516420e]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86_64-switch_to-load-tls-descriptors-before-switchi.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: needed
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable:
Modified: active/CVE-2014-9420
===================================================================
--- active/CVE-2014-9420 2015-01-29 01:00:24 UTC (rev 3658)
+++ active/CVE-2014-9420 2015-01-29 01:02:19 UTC (rev 3659)
@@ -3,9 +3,9 @@
Notes:
Bugs:
upstream: released (v3.19-rc1) [f54e18f1b831c92f6512d2eedb224cd63d607d3d]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
3.2-wheezy-security: released (3.2.65-1) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable:
Modified: active/CVE-2014-9584
===================================================================
--- active/CVE-2014-9584 2015-01-29 01:00:24 UTC (rev 3658)
+++ active/CVE-2014-9584 2015-01-29 01:02:19 UTC (rev 3659)
@@ -6,6 +6,6 @@
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: needed
Modified: active/CVE-2014-9585
===================================================================
--- active/CVE-2014-9585 2015-01-29 01:00:24 UTC (rev 3658)
+++ active/CVE-2014-9585 2015-01-29 01:02:19 UTC (rev 3659)
@@ -4,9 +4,9 @@
Notes:
Bugs:
upstream: released (3.19-rc4) [394f56fe480140877304d342dec46d50dc823d46]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
3.16-upstream-stable: pending (3.16.7-ckt5)
3.2-upstream-stable:
More information about the kernel-sec-discuss
mailing list