[kernel-sec-discuss] r3829 - active

Ben Hutchings benh at moszumanska.debian.org
Sun Jun 14 18:18:24 UTC 2015


Author: benh
Date: 2015-06-14 18:18:24 +0000 (Sun, 14 Jun 2015)
New Revision: 3829

Modified:
   active/CVE-2014-9728
   active/CVE-2014-9729
   active/CVE-2014-9730
   active/CVE-2014-9731
   active/CVE-2015-1805
   active/CVE-2015-4036
   active/CVE-2015-4167
Log:
Update status of issues in 2.6.32/squeeze

Modified: active/CVE-2014-9728
===================================================================
--- active/CVE-2014-9728	2015-06-11 12:08:14 UTC (rev 3828)
+++ active/CVE-2014-9728	2015-06-14 18:18:24 UTC (rev 3829)
@@ -5,8 +5,8 @@
 upstream: released (v3.19-rc3) [e159332b9af4b04d882dbcfe1bb0117f0a6d4b58, e237ec37ec154564f8690c5bd1795339955eeef9, a1d47b262952a45aae62bd49cfaf33dd76c11a2c]
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: released (3.2.67)
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1)
 3.16-jessie-security: N/A
 3.2-wheezy-security: released (3.2.68-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-verify-i_size-when-loading-inode.patch, bugfix/all/udf-verify-symlink-size-before-loading-it.patch, bugfix/all/udf-check-component-length-before-reading-it.patch]

Modified: active/CVE-2014-9729
===================================================================
--- active/CVE-2014-9729	2015-06-11 12:08:14 UTC (rev 3828)
+++ active/CVE-2014-9729	2015-06-14 18:18:24 UTC (rev 3829)
@@ -7,8 +7,8 @@
 upstream: released (v3.19-rc3) [e159332b9af4b04d882dbcfe1bb0117f0a6d4b58]
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: released (3.2.67)
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1)
 3.16-jessie-security: N/A
 3.2-wheezy-security: released (3.2.68-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-verify-i_size-when-loading-inode.patch]

Modified: active/CVE-2014-9730
===================================================================
--- active/CVE-2014-9730	2015-06-11 12:08:14 UTC (rev 3828)
+++ active/CVE-2014-9730	2015-06-14 18:18:24 UTC (rev 3829)
@@ -8,8 +8,8 @@
 upstream: released (v3.19-rc3) [e237ec37ec154564f8690c5bd1795339955eeef9]
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: released (3.2.67)
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1)
 3.16-jessie-security: N/A
 3.2-wheezy-security: released (3.2.68-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-check-component-length-before-reading-it.patch]

Modified: active/CVE-2014-9731
===================================================================
--- active/CVE-2014-9731	2015-06-11 12:08:14 UTC (rev 3828)
+++ active/CVE-2014-9731	2015-06-14 18:18:24 UTC (rev 3829)
@@ -5,8 +5,8 @@
 upstream: released (v3.19-rc3) [0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14]
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: released (3.2.67)
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1)
 3.16-jessie-security: N/A
 3.2-wheezy-security: released (3.2.68-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-check-path-length-when-reading-symlink.patch]

Modified: active/CVE-2015-1805
===================================================================
--- active/CVE-2015-1805	2015-06-11 12:08:14 UTC (rev 3828)
+++ active/CVE-2015-1805	2015-06-14 18:18:24 UTC (rev 3829)
@@ -7,8 +7,8 @@
 upstream: released (v3.16-rc1) [637b58c2887e5e57850865839cc75f59184b23d1, f0d1bec9d58d4c038d0ac958c9af82be6eb18045]
 3.2-upstream-stable:
 3.16-jessie-security: N/A
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
 sid: released (3.16.2-2)
 3.2-wheezy-security:
 3.16-upstream-stable: N/A
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/pipe-iovec-fix-memory-corruption-when-retrying-atomi.patch]

Modified: active/CVE-2015-4036
===================================================================
--- active/CVE-2015-4036	2015-06-11 12:08:14 UTC (rev 3828)
+++ active/CVE-2015-4036	2015-06-14 18:18:24 UTC (rev 3829)
@@ -5,8 +5,8 @@
 upstream: released (v4.0-rc1) [59c816c1f24df0204e01851431d3bab3eb76719c]
 3.16-upstream-stable: released (3.16.7-ckt8)
 3.2-upstream-stable:
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: N/A "vulnerable code not present"
 sid: released (4.0.2-1)
 3.16-jessie-security: released (3.16.7-ckt9-1)
 3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: N/A "vulnerable code not present"

Modified: active/CVE-2015-4167
===================================================================
--- active/CVE-2015-4167	2015-06-11 12:08:14 UTC (rev 3828)
+++ active/CVE-2015-4167	2015-06-14 18:18:24 UTC (rev 3829)
@@ -5,8 +5,8 @@
 upstream: released (v4.0-rc1) [23b133bdc452aa441fcb9b82cbf6dd05cfd342d0]
 3.16-upstream-stable:
 3.2-upstream-stable: released (3.2.69)
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
 sid: released (4.0.2-1)
 3.16-jessie-security: released (3.16.7-ckt13)
 3.2-wheezy-security: needed
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-check-length-of-extended-attributes-and-allocati.patch]




More information about the kernel-sec-discuss mailing list