[kernel-sec-discuss] r4128 - retired

Moritz Muehlenhoff jmm at moszumanska.debian.org
Sat Jan 30 17:25:03 UTC 2016


Author: jmm
Date: 2016-01-30 17:25:03 +0000 (Sat, 30 Jan 2016)
New Revision: 4128

Modified:
   retired/CVE-2013-7446
   retired/CVE-2015-7550
   retired/CVE-2015-7799
   retired/CVE-2015-7990
   retired/CVE-2015-8324
   retired/CVE-2015-8543
   retired/CVE-2015-8575
Log:
fixes from 2.6.32.70


Modified: retired/CVE-2013-7446
===================================================================
--- retired/CVE-2013-7446	2016-01-30 17:22:01 UTC (rev 4127)
+++ retired/CVE-2013-7446	2016-01-30 17:25:03 UTC (rev 4128)
@@ -9,7 +9,7 @@
 upstream: released (4.4-rc4) [7d267278a9ece963d77eefec61630223fce08c6c]
 3.16-upstream-stable: released (3.16.7-ckt22)
 3.2-upstream-stable: released (3.2.75) [unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
-2.6.32-upstream-stable: pending (2.6.32.70)
+2.6.32-upstream-stable: released (2.6.32.70)
 sid: released (4.2.6-2) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
 3.16-jessie-security: released (3.16.7-ckt20-1+deb8u1) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
 3.2-wheezy-security: released (3.2.73-2+deb7u1) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]

Modified: retired/CVE-2015-7550
===================================================================
--- retired/CVE-2015-7550	2016-01-30 17:22:01 UTC (rev 4127)
+++ retired/CVE-2015-7550	2016-01-30 17:25:03 UTC (rev 4128)
@@ -5,7 +5,7 @@
 upstream: released (4.4-rc8) [b4a1b4f5047e4f54e194681125c74c0aa64d637d]
 3.16-upstream-stable: released (3.16.7-ckt22)
 3.2-upstream-stable: released (3.2.76) [keys-fix-race-between-read-and-revoke.patch]
-2.6.32-upstream-stable: pending (2.6.32.70)
+2.6.32-upstream-stable: released (2.6.32.70)
 sid: released (4.3.3-3) [bugfix/all/keys-fix-race-between-read-and-revoke.patch]
 3.16-jessie-security: released (3.16.7-ckt20-1+deb8u2) [bugfix/all/keys-fix-race-between-read-and-revoke.patch]
 3.2-wheezy-security: released (3.2.73-2+deb7u2) [bugfix/all/keys-fix-race-between-read-and-revoke.patch]

Modified: retired/CVE-2015-7799
===================================================================
--- retired/CVE-2015-7799	2016-01-30 17:22:01 UTC (rev 4127)
+++ retired/CVE-2015-7799	2016-01-30 17:25:03 UTC (rev 4128)
@@ -6,7 +6,7 @@
 upstream: released (4.4-rc1) [0baa57d8dc32db78369d8b5176ef56c5e2e18ab3, 4ab42d78e37a294ac7bc56901d563c642e03c4ae]
 3.16-upstream-stable: released (3.16.7-ckt20) [bcd596b01fd5cea4591cd1cc8c1183f3da4bed68, 9bd814beb46d6d3d5eeb374c2b38c8b75523190a]
 3.2-upstream-stable: released (3.2.75) [isdn_ppp-add-checks-for-allocation-failure-in-isdn_ppp_open.patch, ppp-slip-validate-vj-compression-slot-parameters-completely.patch]
-2.6.32-upstream-stable: pending (2.6.32.70)
+2.6.32-upstream-stable: released (2.6.32.70)
 sid: released (4.2.6-2) [bugfix/all/isdn_ppp-add-checks-for-allocation-failure-in-isdn_p.patch, bugfix/all/ppp-slip-validate-vj-compression-slot-parameters-com.patch]
 3.16-jessie-security: released (3.16.7-ckt20-1+deb8u1)
 3.2-wheezy-security: released (3.2.73-2+deb7u1) [bugfix/all/isdn_ppp-add-checks-for-allocation-failure-in-isdn_p.patch, bugfix/all/ppp-slip-validate-vj-compression-slot-parameters-com.patch]

Modified: retired/CVE-2015-7990
===================================================================
--- retired/CVE-2015-7990	2016-01-30 17:22:01 UTC (rev 4127)
+++ retired/CVE-2015-7990	2016-01-30 17:25:03 UTC (rev 4128)
@@ -6,7 +6,7 @@
 upstream: released (4.4-rc4) [8c7188b23474cca017b3ef354c4a58456f68303a]
 3.16-upstream-stable: released (3.16.7-ckt22)
 3.2-upstream-stable: released (3.2.75) [rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
-2.6.32-upstream-stable: pending (2.6.32.70)
+2.6.32-upstream-stable: released (2.6.32.70)
 sid: released (4.2.6-1) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]

Modified: retired/CVE-2015-8324
===================================================================
--- retired/CVE-2015-8324	2016-01-30 17:22:01 UTC (rev 4127)
+++ retired/CVE-2015-8324	2016-01-30 17:25:03 UTC (rev 4128)
@@ -5,7 +5,7 @@
 upstream: released (v2.6.34-rc1) [744692dc059845b2a3022119871846e74d4f6e11]
 3.16-upstream-stable: N/A "Fixed before 3.16"
 3.2-upstream-stable: N/A "Fixed before 3.2"
-2.6.32-upstream-stable: pending (2.6.32.70)
+2.6.32-upstream-stable: released (2.6.32.70)
 sid: released (2.6.37-1)
 3.16-jessie-security: N/A "Fixed before 3.16"
 3.2-wheezy-security: N/A "Fixed before 3.2"

Modified: retired/CVE-2015-8543
===================================================================
--- retired/CVE-2015-8543	2016-01-30 17:22:01 UTC (rev 4127)
+++ retired/CVE-2015-8543	2016-01-30 17:25:03 UTC (rev 4128)
@@ -10,7 +10,7 @@
 upstream: released (4.4-rc6) [79462ad02e861803b3840cc782248c7359451cd9]
 3.16-upstream-stable: released (3.16.7-ckt22)
 3.2-upstream-stable: released (3.2.75) [net-add-validation-for-the-socket-syscall-protocol-argument.patch]
-2.6.32-upstream-stable: pending (2.6.32.70)
+2.6.32-upstream-stable: released (2.6.32.70)
 sid: released (4.3.3-1) [bugfix/all/net-add-validation-for-the-socket-syscall-protocol.patch]
 3.16-jessie-security: released (3.16.7-ckt20-1+deb8u1) [bugfix/all/net-add-validation-for-the-socket-syscall-protocol.patch]
 3.2-wheezy-security: released (3.2.73-2+deb7u2) [bugfix/all/net-add-validation-for-the-socket-syscall-protocol.patch]

Modified: retired/CVE-2015-8575
===================================================================
--- retired/CVE-2015-8575	2016-01-30 17:22:01 UTC (rev 4127)
+++ retired/CVE-2015-8575	2016-01-30 17:25:03 UTC (rev 4128)
@@ -5,7 +5,7 @@
 upstream: released (4.4-rc6) [5233252fce714053f0151680933571a2da9cbfb4]
 3.16-upstream-stable: released (3.16.7-ckt22)
 3.2-upstream-stable: released (3.2.75) [bluetooth-validate-socket-address-length-in-sco_sock_bind.patch]
-2.6.32-upstream-stable: pending (2.6.32.70)
+2.6.32-upstream-stable: released (2.6.32.70)
 sid: released (4.3.3-3) [bugfix/all/bluetooth-validate-socket-address-length-in-sco_sock.patch]
 3.16-jessie-security: released (3.16.7-ckt20-1+deb8u2) [bugfix/all/bluetooth-validate-socket-address-length-in-sco_sock.patch]
 3.2-wheezy-security: released (3.2.73-2+deb7u2) [bugfix/all/bluetooth-validate-socket-address-length-in-sco_sock.patch]




More information about the kernel-sec-discuss mailing list