[kernel-sec-discuss] r3634 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Jan 5 06:11:30 UTC 2015


Author: jmm
Date: 2015-01-05 06:11:30 +0000 (Mon, 05 Jan 2015)
New Revision: 3634

Modified:
   active/CVE-2014-6410
   active/CVE-2014-7841
   active/CVE-2014-7842
   active/CVE-2014-8133
   active/CVE-2014-8134
   active/CVE-2014-8559
   active/CVE-2014-8884
Log:
3.2.66 released


Modified: active/CVE-2014-6410
===================================================================
--- active/CVE-2014-6410	2015-01-01 07:02:44 UTC (rev 3633)
+++ active/CVE-2014-6410	2015-01-05 06:11:30 UTC (rev 3634)
@@ -8,4 +8,4 @@
 3.2-wheezy-security: released (3.2.63-1) [bugfix/all/udf-Avoid-infinite-loop-when-processing-indirect-ICB.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze10)
 3.16-upstream-stable: released (3.16.5)
-3.2-upstream-stable: pending (3.2.66) [udf-avoid-infinite-loop-when-processing-indirect-icbs.patch]
+3.2-upstream-stable: released (3.2.66) [udf-avoid-infinite-loop-when-processing-indirect-icbs.patch]

Modified: active/CVE-2014-7841
===================================================================
--- active/CVE-2014-7841	2015-01-01 07:02:44 UTC (rev 3633)
+++ active/CVE-2014-7841	2015-01-05 06:11:30 UTC (rev 3634)
@@ -8,4 +8,4 @@
 3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/net-sctp-fix-NULL-pointer-dereference-in-af-from_add.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze10)
 3.16-upstream-stable: released (3.16.7-ckt2)
-3.2-upstream-stable: pending (3.2.66) [net-sctp-fix-null-pointer-dereference-in-af-from_addr_param-on.patch]
+3.2-upstream-stable: released (3.2.66) [net-sctp-fix-null-pointer-dereference-in-af-from_addr_param-on.patch]

Modified: active/CVE-2014-7842
===================================================================
--- active/CVE-2014-7842	2015-01-01 07:02:44 UTC (rev 3633)
+++ active/CVE-2014-7842	2015-01-05 06:11:30 UTC (rev 3634)
@@ -10,4 +10,4 @@
 3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/kvm-x86-don-t-report-guest-userspace-emulation-error-to-userspace.patch]
 2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"
 3.16-upstream-stable: released (3.16.7-ckt2)
-3.2-upstream-stable: pending (3.2.66) [kvm-x86-don-t-report-guest-userspace-emulation-error-to-userspace.patch]
+3.2-upstream-stable: released (3.2.66) [kvm-x86-don-t-report-guest-userspace-emulation-error-to-userspace.patch]

Modified: active/CVE-2014-8133
===================================================================
--- active/CVE-2014-8133	2015-01-01 07:02:44 UTC (rev 3633)
+++ active/CVE-2014-8133	2015-01-05 06:11:30 UTC (rev 3634)
@@ -8,4 +8,4 @@
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: needed
-3.2-upstream-stable: pending (3.2.66) [x86-tls-validate-tls-entries-to-protect-espfix.patch]
+3.2-upstream-stable: released (3.2.66) [x86-tls-validate-tls-entries-to-protect-espfix.patch]

Modified: active/CVE-2014-8134
===================================================================
--- active/CVE-2014-8134	2015-01-01 07:02:44 UTC (rev 3633)
+++ active/CVE-2014-8134	2015-01-05 06:11:30 UTC (rev 3634)
@@ -11,4 +11,4 @@
 3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: needed
-3.2-upstream-stable: pending (3.2.66) [x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
+3.2-upstream-stable: released (3.2.66) [x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]

Modified: active/CVE-2014-8559
===================================================================
--- active/CVE-2014-8559	2015-01-01 07:02:44 UTC (rev 3633)
+++ active/CVE-2014-8559	2015-01-05 06:11:30 UTC (rev 3634)
@@ -17,4 +17,4 @@
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: N/A
 3.16-upstream-stable: needed
-3.2-upstream-stable: pending (3.2.66) [move-d_rcu-from-overlapping-d_child-to-overlapping-d_alias.patch, deal-with-deadlock-in-d_walk.patch]
+3.2-upstream-stable: released (3.2.66) [move-d_rcu-from-overlapping-d_child-to-overlapping-d_alias.patch, deal-with-deadlock-in-d_walk.patch]

Modified: active/CVE-2014-8884
===================================================================
--- active/CVE-2014-8884	2015-01-01 07:02:44 UTC (rev 3633)
+++ active/CVE-2014-8884	2015-01-05 06:11:30 UTC (rev 3634)
@@ -9,4 +9,4 @@
 3.2-wheezy-security: released (3.2.63-2+deb7u2) [bugfix/all/media-ttusb-dec-buffer-overflow-in-ioctl.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze10)
 3.16-upstream-stable: released (3.16.7-ckt2)
-3.2-upstream-stable: pending (3.2.66) [ttusb-dec-buffer-overflow-in-ioctl.patch]
+3.2-upstream-stable: released (3.2.66) [ttusb-dec-buffer-overflow-in-ioctl.patch]




More information about the kernel-sec-discuss mailing list