[kernel-sec-discuss] r3842 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed Jun 17 07:05:33 UTC 2015


Author: jmm
Date: 2015-06-17 07:05:33 +0000 (Wed, 17 Jun 2015)
New Revision: 3842

Modified:
   active/CVE-2011-5321
   active/CVE-2012-6689
   active/CVE-2014-3184
   active/CVE-2014-9683
   active/CVE-2014-9728
   active/CVE-2014-9729
   active/CVE-2014-9730
   active/CVE-2014-9731
   active/CVE-2015-1805
   active/CVE-2015-4167
Log:
fixes from squeeze-lts


Modified: active/CVE-2011-5321
===================================================================
--- active/CVE-2011-5321	2015-06-17 07:03:16 UTC (rev 3841)
+++ active/CVE-2011-5321	2015-06-17 07:05:33 UTC (rev 3842)
@@ -9,6 +9,6 @@
 sid: released (3.2.1-1)
 3.16-jessie-security: N/A "Fixed before initial release"
 3.2-wheezy-security: N/A "Fixed before initial release"
-2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/tty-drop-driver-reference-in-tty_open-fail-path.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze12) [bugfix/all/tty-drop-driver-reference-in-tty_open-fail-path.patch]
 3.16-upstream-stable: N/A "Fixed before initial release"
 3.2-upstream-stable: released (v3.2-rc1) [c290f8358acaeffd8e0c551ddcc24d1206143376]

Modified: active/CVE-2012-6689
===================================================================
--- active/CVE-2012-6689	2015-06-17 07:03:16 UTC (rev 3841)
+++ active/CVE-2012-6689	2015-06-17 07:05:33 UTC (rev 3842)
@@ -7,6 +7,6 @@
 sid: released (3.2.30-1)
 3.16-jessie-security: N/A "Fixed before initial release"
 3.2-wheezy-security: N/A "fixed before wheezy release"
-2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/netlink-fix-possible-spoofing-from-non-root-processe.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze12) [bugfix/all/netlink-fix-possible-spoofing-from-non-root-processe.patch]
 3.16-upstream-stable: N/A "fixed before 3.16"
 3.2-upstream-stable: released (3.2.30)

Modified: active/CVE-2014-3184
===================================================================
--- active/CVE-2014-3184	2015-06-17 07:03:16 UTC (rev 3841)
+++ active/CVE-2014-3184	2015-06-17 07:05:33 UTC (rev 3842)
@@ -8,6 +8,6 @@
 sid: released (3.16.2-2)
 3.16-jessie-security: N/A "Fixed before initial release"
 3.2-wheezy-security: released (3.2.63-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/hid-fix-a-couple-of-off-by-ones.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze12) [bugfix/all/hid-fix-a-couple-of-off-by-ones.patch]
 3.16-upstream-stable: released (3.16.2)
 3.2-upstream-stable: released (3.2.63)

Modified: active/CVE-2014-9683
===================================================================
--- active/CVE-2014-9683	2015-06-17 07:03:16 UTC (rev 3841)
+++ active/CVE-2014-9683	2015-06-17 07:05:33 UTC (rev 3842)
@@ -7,6 +7,6 @@
 sid: released (3.16.7-ckt4-1)
 3.16-jessie-security: N/A "Fixed before initial release"
 3.2-wheezy-security: released (3.2.65-1+deb7u2)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze11) [bugfix/all/ecryptfs-remove-buggy-and-unnecessary-write-in-file-.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/ecryptfs-remove-buggy-and-unnecessary-write-in-file-.patch]
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: released (3.2.67)

Modified: active/CVE-2014-9728
===================================================================
--- active/CVE-2014-9728	2015-06-17 07:03:16 UTC (rev 3841)
+++ active/CVE-2014-9728	2015-06-17 07:05:33 UTC (rev 3842)
@@ -9,4 +9,4 @@
 sid: released (3.16.7-ckt4-1)
 3.16-jessie-security: N/A
 3.2-wheezy-security: released (3.2.68-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-verify-i_size-when-loading-inode.patch, bugfix/all/udf-verify-symlink-size-before-loading-it.patch, bugfix/all/udf-check-component-length-before-reading-it.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze12) [bugfix/all/udf-verify-i_size-when-loading-inode.patch, bugfix/all/udf-verify-symlink-size-before-loading-it.patch, bugfix/all/udf-check-component-length-before-reading-it.patch]

Modified: active/CVE-2014-9729
===================================================================
--- active/CVE-2014-9729	2015-06-17 07:03:16 UTC (rev 3841)
+++ active/CVE-2014-9729	2015-06-17 07:05:33 UTC (rev 3842)
@@ -11,4 +11,4 @@
 sid: released (3.16.7-ckt4-1)
 3.16-jessie-security: N/A
 3.2-wheezy-security: released (3.2.68-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-verify-i_size-when-loading-inode.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze12) [bugfix/all/udf-verify-i_size-when-loading-inode.patch]

Modified: active/CVE-2014-9730
===================================================================
--- active/CVE-2014-9730	2015-06-17 07:03:16 UTC (rev 3841)
+++ active/CVE-2014-9730	2015-06-17 07:05:33 UTC (rev 3842)
@@ -12,4 +12,4 @@
 sid: released (3.16.7-ckt4-1)
 3.16-jessie-security: N/A
 3.2-wheezy-security: released (3.2.68-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-check-component-length-before-reading-it.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze12) [bugfix/all/udf-check-component-length-before-reading-it.patch]

Modified: active/CVE-2014-9731
===================================================================
--- active/CVE-2014-9731	2015-06-17 07:03:16 UTC (rev 3841)
+++ active/CVE-2014-9731	2015-06-17 07:05:33 UTC (rev 3842)
@@ -9,4 +9,4 @@
 sid: released (3.16.7-ckt4-1)
 3.16-jessie-security: N/A
 3.2-wheezy-security: released (3.2.68-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-check-path-length-when-reading-symlink.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze12) [bugfix/all/udf-check-path-length-when-reading-symlink.patch]

Modified: active/CVE-2015-1805
===================================================================
--- active/CVE-2015-1805	2015-06-17 07:03:16 UTC (rev 3841)
+++ active/CVE-2015-1805	2015-06-17 07:05:33 UTC (rev 3842)
@@ -11,4 +11,4 @@
 sid: released (3.16.2-2)
 3.2-wheezy-security: pending (3.2.68-1+deb7u2) [bugfix/all/pipe-iovec-fix-memory-corruption-when-retrying-atomi.patch]
 3.16-upstream-stable: N/A
-2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/pipe-iovec-fix-memory-corruption-when-retrying-atomi.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze12) [bugfix/all/pipe-iovec-fix-memory-corruption-when-retrying-atomi.patch]

Modified: active/CVE-2015-4167
===================================================================
--- active/CVE-2015-4167	2015-06-17 07:03:16 UTC (rev 3841)
+++ active/CVE-2015-4167	2015-06-17 07:05:33 UTC (rev 3842)
@@ -9,4 +9,4 @@
 sid: released (4.0.2-1)
 3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u1) [bugfix/all/udf-check-length-of-extended-attributes-and-allocati.patch]
 3.2-wheezy-security: pending (3.2.68-1+deb7u2) [bugfix/all/udf-check-length-of-extended-attributes-and-allocati.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-check-length-of-extended-attributes-and-allocati.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze12) [bugfix/all/udf-check-length-of-extended-attributes-and-allocati.patch]




More information about the kernel-sec-discuss mailing list