[kernel-sec-discuss] r3648 - active

Ben Hutchings benh at moszumanska.debian.org
Fri Jan 16 02:09:52 UTC 2015


Author: benh
Date: 2015-01-16 02:09:52 +0000 (Fri, 16 Jan 2015)
New Revision: 3648

Modified:
   active/CVE-2014-8133
   active/CVE-2014-8134
   active/CVE-2014-8160
   active/CVE-2014-8559
   active/CVE-2014-8989
   active/CVE-2014-9419
   active/CVE-2014-9420
   active/CVE-2014-9428
   active/CVE-2014-9529
   active/CVE-2014-9584
   active/CVE-2014-9585
Log:
Mark issued fixed and released in 3.16.7-ckt4-1

Modified: active/CVE-2014-8133
===================================================================
--- active/CVE-2014-8133	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-8133	2015-01-16 02:09:52 UTC (rev 3648)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.19-rc1) [41bdc78544b8a93a9c6814b8bbbfef966272abbe]
 2.6.32-upstream-stable: needed
-sid: pending (3.16.7-ckt4-1)
+sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt4)

Modified: active/CVE-2014-8134
===================================================================
--- active/CVE-2014-8134	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-8134	2015-01-16 02:09:52 UTC (rev 3648)
@@ -7,7 +7,7 @@
 Bugs:
 upstream: released (3.19-rc1) [29fa6825463c97e5157284db80107d1bfac5d77b]
 2.6.32-upstream-stable: needed
-sid: pending (3.16.7-ckt4-1)
+sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: released (3.2.65-1) [bugfix/x86/x86-kvm-clear-paravirt_enabled-on-kvm-guests-for-espfix32-s-benefit.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt4)

Modified: active/CVE-2014-8160
===================================================================
--- active/CVE-2014-8160	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-8160	2015-01-16 02:09:52 UTC (rev 3648)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.18) [db29a9508a9246e77087c5531e45b2c88ec6988b]
 2.6.32-upstream-stable: 
-sid:
+sid: released (3.16.7-ckt4-1) [bugfix/all/netfilter-conntrack-disable-generic-tracking-for-kno.patch]
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.16-upstream-stable:

Modified: active/CVE-2014-8559
===================================================================
--- active/CVE-2014-8559	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-8559	2015-01-16 02:09:52 UTC (rev 3648)
@@ -13,7 +13,7 @@
 Bugs:
 upstream: released (3.19-rc1) [946e51f2bf37f1656916eb75bd0742ba33983c28, ca5358ef75fc69fee5322a38a340f5739d997c10]
 2.6.32-upstream-stable: N/A
-sid: pending (3.16.7-ckt4-1)
+sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: N/A
 3.16-upstream-stable: released (3.16.7-ckt4)

Modified: active/CVE-2014-8989
===================================================================
--- active/CVE-2014-8989	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-8989	2015-01-16 02:09:52 UTC (rev 3648)
@@ -10,7 +10,7 @@
 Bugs:
 upstream: released (3.19-rc1) [0542f17bf2c1f2430d368f44c8fcf2f82ec9e53e, 273d2c67c3e179adb1e74f403d1e9a06e3f841b5, be7c6dba2332cef0677fbabb606e279ae76652c3, 80dd00a23784b384ccea049bfb3f259d3f973b9d, f95d7918bd1e724675de4940039f2865e5eec5fe, f0d62aec931e4ae3333c797d346dc4f188f454ba, 9cc46516ddf497ea16e8d7cb986ae03a0f6b92f8, 66d2f338ee4c449396b6f99f5e75cd18eb6df272, db86da7cb76f797a1a8b445166a15cb922c6ff85]
 2.6.32-upstream-stable: N/A "User namespaces not usable"
-sid: pending (3.16.7-ckt4-1)
+sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: N/A "User namespaces not usable"
 2.6.32-squeeze-security: N/A "User namespaces not usable"
 3.16-upstream-stable: released (3.16.7-ckt4)

Modified: active/CVE-2014-9419
===================================================================
--- active/CVE-2014-9419	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-9419	2015-01-16 02:09:52 UTC (rev 3648)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (v3.19-rc1) [f647d7c155f069c1a068030255c300663516420e]
 2.6.32-upstream-stable:
-sid: pending (3.16.7-ckt4-1)
+sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/x86/x86_64-switch_to-load-tls-descriptors-before-switchi.patch]
 2.6.32-squeeze-security:
 3.16-upstream-stable: released (3.16.7-ckt4)

Modified: active/CVE-2014-9420
===================================================================
--- active/CVE-2014-9420	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-9420	2015-01-16 02:09:52 UTC (rev 3648)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (v3.19-rc1) [f54e18f1b831c92f6512d2eedb224cd63d607d3d]
 2.6.32-upstream-stable:
-sid: pending (3.16.7-ckt4-1)
+sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: released (3.2.65-1) [bugfix/all/isofs-fix-infinite-looping-over-ce-entries.patch]
 2.6.32-squeeze-security:
 3.16-upstream-stable: released (3.16.7-ckt4)

Modified: active/CVE-2014-9428
===================================================================
--- active/CVE-2014-9428	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-9428	2015-01-16 02:09:52 UTC (rev 3648)
@@ -4,7 +4,7 @@
 Bugs: https://bugs.debian.org/774155
 upstream: released (3.19-rc3) [5b6698b0e4a37053de35cc24ee695b98a7eb712b]
 2.6.32-upstream-stable: N/A "Introduced in 3.13-rc1"
-sid: pending (3.16.7-ckt4-1)
+sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: N/A "Introduced in 3.13-rc1"
 2.6.32-squeeze-security: N/A "Introduced in 3.13-rc1"
 3.16-upstream-stable: released (3.16.7-ckt4)

Modified: active/CVE-2014-9529
===================================================================
--- active/CVE-2014-9529	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-9529	2015-01-16 02:09:52 UTC (rev 3648)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.19-rc4) [a3a8784454692dd72e5d5d34dcdab17b4420e74c]
 2.6.32-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (3.16.7-ckt4-1)
+sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/all/keys-close-race-between-key-lookup-and-freeing.patch]
 2.6.32-squeeze-security: N/A "Vulnerable code not present"
 3.16-upstream-stable: released (3.16.7-ckt4)

Modified: active/CVE-2014-9584
===================================================================
--- active/CVE-2014-9584	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-9584	2015-01-16 02:09:52 UTC (rev 3648)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.19-rc3) [4e2024624e678f0ebb916e6192bd23c1f9fdf696]
 2.6.32-upstream-stable: needed
-sid: pending (3.16.7-ckt4-1)
+sid: released (3.16.7-ckt4-1)
 3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt4)

Modified: active/CVE-2014-9585
===================================================================
--- active/CVE-2014-9585	2015-01-16 00:08:15 UTC (rev 3647)
+++ active/CVE-2014-9585	2015-01-16 02:09:52 UTC (rev 3648)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.19-rc4) [394f56fe480140877304d342dec46d50dc823d46]
 2.6.32-upstream-stable:
-sid: needed
+sid: released (3.16.7-ckt4-1) [bugfix/x86/x86_64-vdso-fix-the-vdso-address-randomization-algor.patch]
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.16-upstream-stable: needed




More information about the kernel-sec-discuss mailing list