[kernel] r22086 - dists/squeeze-security/linux-2.6/debian/patches/series

Raphaël Hertzog hertzog at moszumanska.debian.org
Thu Nov 27 09:28:52 UTC 2014


Author: hertzog
Date: Thu Nov 27 09:28:52 2014
New Revision: 22086

Log:
Disable remaining patches included in 2.6.32.61..2.6.32.64

Next step: ensure the openvz patch applies again.

Modified:
   dists/squeeze-security/linux-2.6/debian/patches/series/48squeeze9

Modified: dists/squeeze-security/linux-2.6/debian/patches/series/48squeeze9
==============================================================================
--- dists/squeeze-security/linux-2.6/debian/patches/series/48squeeze9	Tue Nov 25 16:37:48 2014	(r22085)
+++ dists/squeeze-security/linux-2.6/debian/patches/series/48squeeze9	Thu Nov 27 09:28:52 2014	(r22086)
@@ -77,13 +77,79 @@
 - bugfix/all/xfrm_user-fix-info-leak-in-copy_to_user_state.patch
 - bugfix/all/keys-fix-race-with-concurrent-install_user_keyrings.patch
 - bugfix/all/KVM-Fix-bounds-checking-in-ioapic-indirect-register-.patch
+# End of patches to drop for 2.6.32.61
+- bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch
+- bugfix/s390/fix-kernel-crash-due-to-linkage-stack-instructi.patch
+- bugfix/all/CVE-2013-4512.patch
+- bugfix/all/CVE-2014-1438.patch
+- bugfix/x86/KVM-Fix-potential-divide-by-0-in-lapic-CVE-2013-.patch
+- bugfix/all/CVE-2013-4345.patch
+- bugfix/all/cpqarray-fix-info-leak.patch
+- bugfix/all/CVE-2014-1737_CVE-2014-1738.patch
+- bugfix/all/block-do-not-pass-disknames-as-formatstrings.patch
+- bugfix/all/cdrom-use-kzalloc-for-failing-hw.patch
+- bugfix/all/CVE-2014-0196.patch
+- bugfix/all/hid-helper-to-validate-hid-reports.patch
+- bugfix/all/hid-lg-validate-hid-output-report-details.patch
+- bugfix/all/HID-pantherlord-validate-output-report-details.patch
+- bugfix/all/hid-zeroplus-validate-output.patch
+- bugfix/all/hid-validate-report-id-size.patch
+- bugfix/all/CVE-2013-4299.patch
+- bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch
+- bugfix/all/farsync-fix-info-leak-in-ioctl.patch
+- bugfix/all/wanxl-fix-info-leak-in-ioctl.patch
+- bugfix/all/b43-stop-formatstring-leak.patch
+- bugfix/all/CVE-2013-6378.patch
+- bugfix/all/intel-iommu-Flush-unmaps-at-domain_exit.patch
+- bugfix/all/CVE-2013-6381.patch
+- bugfix/all/CVE-2013-6380.patch
+- bugfix/all/CVE-2013-6383.patch
+- bugfix/all/CVE-2013-4511.patch
+- bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch
+- bugfix/all/CVE-2013-6405-2.patch
+- bugfix/all/CVE-2013-6405-1.patch
+- bugfix/all/sctp-duplicate-cookie-handling-null-pointer-deref.patch
+- bugfix/all/sctp-deal-with-multiple-COOKIE_ECHO-chunks.patch
+- bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch
+- bugfix/all/CVE-2013-0343-patch
+- bugfix/all/af_key-fix-info-leaks-in-notify-msgs.patch
+- bugfix/all/af_key-initialize-sa_type-in-key_notify_policy_flush.patch
+- bugfix/all/netfilter-nf_conntrack_dccp-fix-skb_header_pointer-A.patch
+- bugfix/all/rds-prevent-dereference-of-a-NULL-device.patch
+- bugfix/all/CVE-2014-2678.patch
+- bugfix/all/SELinux-Fix-kernel-BUG-on-empty-security-contexts.patch
+- bugfix/all/CVE-2013-4587.patch
+- bugfix/all/CVE-2013-4162.patch
+- bugfix/all/hid-check-for-null-when-setting-values.patch
+# End of patches to drop for 2.6.32.62
+- bugfix/all/CVE-2014-3917.patch
+- bugfix/all/CVE-2014-3153-4.patch
+- bugfix/all/CVE-2014-3153-3.patch
+- bugfix/all/CVE-2014-3153-2.patch
+- bugfix/all/CVE-2014-3153-1.patch
+# End of patches to drop for 2.6.32.63
+- bugfix/all/CVE-2014-4699.patch
+- bugfix/all/CVE-2014-0203.patch
+- bugfix/all/CVE-2014-3122.patch
+- bugfix/all/CVE-2014-3144_CVE-2014-3145.patch
+- bugfix/all/CVE-2014-4667.patch
+- bugfix/all/CVE-2014-4656-2.patch
+- bugfix/all/CVE-2014-4656-1.patch
+- debian/alsa-avoid-abi-change-for-cve-2014-4652-fix.patch
+- bugfix/all/CVE-2014-4652.patch
+# End of patches to drop for 2.6.32.64
+
 # Add upstream patches
 + bugfix/all/stable/2.6.32.61.patch
 + bugfix/all/stable/2.6.32.62.patch
 + bugfix/all/stable/2.6.32.63.patch
 + bugfix/all/stable/2.6.32.64.patch
-# Reinstate the no ABI change patch
+
+# Reinstate the no ABI change patches
 + debian/nls-Avoid-ABI-change-for-CVE-2013-1773-fix.patch
++ debian/alsa-avoid-abi-change-for-cve-2014-4652-fix.patch
+
+# Add security patches not yet available in upstream kernel
 + bugfix/all/CVE-2014-4653.patch
 + bugfix/all/CVE-2014-4654+4655.patch  
 + bugfix/all/CVE-2014-4943.patch



More information about the Kernel-svn-changes mailing list