[kernel-sec-discuss] r3737 - active
Ben Hutchings
benh at moszumanska.debian.org
Mon Apr 13 01:00:14 UTC 2015
Author: benh
Date: 2015-04-13 01:00:14 +0000 (Mon, 13 Apr 2015)
New Revision: 3737
Modified:
active/CVE-2014-8159
active/CVE-2014-9715
active/CVE-2015-2041
active/CVE-2015-2042
active/CVE-2015-2150
active/CVE-2015-2830
active/CVE-2015-2922
Log:
Mark issues pending in wheezy
Modified: active/CVE-2014-8159
===================================================================
--- active/CVE-2014-8159 2015-04-12 20:56:11 UTC (rev 3736)
+++ active/CVE-2014-8159 2015-04-13 01:00:14 UTC (rev 3737)
@@ -6,7 +6,7 @@
upstream: needed
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt9-1) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.68-2) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
Modified: active/CVE-2014-9715
===================================================================
--- active/CVE-2014-9715 2015-04-12 20:56:11 UTC (rev 3736)
+++ active/CVE-2014-9715 2015-04-13 01:00:14 UTC (rev 3737)
@@ -8,7 +8,7 @@
upstream: released (v3.15-rc1) [223b02d923ecd7c84cf9780bb3686f455d279279]
2.6.32-upstream-stable: N/A "Introduced in 3.6"
sid: released (3.14.5-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.68-2) [bugfix/all/netfilter-nf_conntrack-reserve-two-bytes-for-nf_ct_e.patch]
2.6.32-squeeze-security: N/A "Introduced in 3.6"
3.16-upstream-stable: N/A "Fixed already in v3.15-rc1"
-3.2-upstream-stable: N/A needed
+3.2-upstream-stable: needed
Modified: active/CVE-2015-2041
===================================================================
--- active/CVE-2015-2041 2015-04-12 20:56:11 UTC (rev 3736)
+++ active/CVE-2015-2041 2015-04-13 01:00:14 UTC (rev 3737)
@@ -7,7 +7,7 @@
upstream: released (v3.19-rc7) [6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt9-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.68-2) [bugfix/all/net-llc-use-correct-size-for-sysctl-timeout-entries.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/net-llc-use-correct-size-for-sysctl-timeout-entries.patch]
3.16-upstream-stable: released (3.16.7-ckt8)
3.2-upstream-stable: needed
Modified: active/CVE-2015-2042
===================================================================
--- active/CVE-2015-2042 2015-04-12 20:56:11 UTC (rev 3736)
+++ active/CVE-2015-2042 2015-04-13 01:00:14 UTC (rev 3737)
@@ -7,7 +7,7 @@
upstream: released (v3.19) [db27ebb111e9f69efece08e4cb6a34ff980f8896]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt9-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.68-2) [bugfix/all/net-rds-use-correct-size-for-max-unacked-packets-and.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/net-rds-use-correct-size-for-max-unacked-packets-and.patch]
3.16-upstream-stable: released (3.16.7-ckt8)
3.2-upstream-stable: needed
Modified: active/CVE-2015-2150
===================================================================
--- active/CVE-2015-2150 2015-04-12 20:56:11 UTC (rev 3736)
+++ active/CVE-2015-2150 2015-04-13 01:00:14 UTC (rev 3737)
@@ -6,7 +6,7 @@
upstream: released (4.0-rc4) [af6fc858a35b90e89ea7a7ee58e66628c55c776b]
2.6.32-upstream-stable: N/A "xen-pciback introduced in 3.1"
sid: released (3.16.7-ckt9-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.68-2) [bugfix/all/xen-pciback-limit-guest-control-of-command-register.patch]
2.6.32-squeeze-security: N/A "xen-pciback introduced in 3.1"
3.16-upstream-stable: released (3.16.7-ckt9)
3.2-upstream-stable: needed
Modified: active/CVE-2015-2830
===================================================================
--- active/CVE-2015-2830 2015-04-12 20:56:11 UTC (rev 3736)
+++ active/CVE-2015-2830 2015-04-13 01:00:14 UTC (rev 3737)
@@ -5,7 +5,7 @@
upstream: (v4.0-rc3) [956421fbb74c3a6261903f3836c0740187cf038b]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt9-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.68-2) [bugfix/x86/x86-asm-entry-64-remove-a-bogus-ret_from_fork-optimi.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/x86/x86-asm-entry-64-remove-a-bogus-ret_from_fork-optimi.patch]
3.16-upstream-stable: released (3.16.7-ckt9)
3.2-upstream-stable: needed
Modified: active/CVE-2015-2922
===================================================================
--- active/CVE-2015-2922 2015-04-12 20:56:11 UTC (rev 3736)
+++ active/CVE-2015-2922 2015-04-13 01:00:14 UTC (rev 3737)
@@ -5,7 +5,7 @@
upstream: pending [6fd99094de2b83d1d4c8457f2c83483b2828e75a]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt9-1) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.68-2) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list