[kernel-sec-discuss] r4207 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Feb 29 08:33:45 UTC 2016


Author: jmm
Date: 2016-02-29 08:33:45 +0000 (Mon, 29 Feb 2016)
New Revision: 4207

Modified:
   active/CVE-2015-8812
   active/CVE-2016-0774
   active/CVE-2016-2384
Log:
2.6.32-48squeeze20 released


Modified: active/CVE-2015-8812
===================================================================
--- active/CVE-2015-8812	2016-02-29 00:43:38 UTC (rev 4206)
+++ active/CVE-2015-8812	2016-02-29 08:33:45 UTC (rev 4207)
@@ -11,4 +11,4 @@
 sid: released (4.4.2-1) [bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u4) [bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]
 3.2-wheezy-security: pending (3.2.73-2+deb7u3) [bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze20) [bugfix/all/rdma-cxgb3-don-t-free-skbs-on-net_xmit_-indications-.patch, bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze20) [bugfix/all/rdma-cxgb3-don-t-free-skbs-on-net_xmit_-indications-.patch, bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]

Modified: active/CVE-2016-0774
===================================================================
--- active/CVE-2016-0774	2016-02-29 00:43:38 UTC (rev 4206)
+++ active/CVE-2016-0774	2016-02-29 08:33:45 UTC (rev 4207)
@@ -9,4 +9,4 @@
 sid: N/A "upstream fix was correct"
 3.16-jessie-security: N/A "upstream fix was correct"
 3.2-wheezy-security: pending (3.2.73-2+deb7u3) [bugfix/all/pipe-fix-buffer-offset-after-partially-failed-read.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze20) [bugfix/all/pipe-fix-buffer-offset-after-partially-failed-read.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze20) [bugfix/all/pipe-fix-buffer-offset-after-partially-failed-read.patch]

Modified: active/CVE-2016-2384
===================================================================
--- active/CVE-2016-2384	2016-02-29 00:43:38 UTC (rev 4206)
+++ active/CVE-2016-2384	2016-02-29 08:33:45 UTC (rev 4207)
@@ -9,4 +9,4 @@
 sid: released (4.4.2-1) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u4) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
 3.2-wheezy-security: pending (3.2.73-2+deb7u3) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze20) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze20) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]




More information about the kernel-sec-discuss mailing list