[kernel-sec-discuss] r3649 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Fri Jan 16 18:01:43 UTC 2015


Author: jmm
Date: 2015-01-16 18:01:43 +0000 (Fri, 16 Jan 2015)
New Revision: 3649

Modified:
   active/CVE-2013-6885
   active/CVE-2014-8133
   active/CVE-2014-9419
   active/CVE-2014-9529
   active/CVE-2014-9584
Log:
record wheezy security update


Modified: active/CVE-2013-6885
===================================================================
--- active/CVE-2013-6885	2015-01-16 02:09:52 UTC (rev 3648)
+++ active/CVE-2013-6885	2015-01-16 18:01:43 UTC (rev 3649)
@@ -5,7 +5,7 @@
 upstream: released (3.14-rc2) [3b56496865f9f7d9bcb2f93b44c63f274f08e3b6]
 2.6.32-upstream-stable: needed
 sid: released (3.14.2-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: N/A "fixed before 3.16"
 3.2-upstream-stable: needed

Modified: active/CVE-2014-8133
===================================================================
--- active/CVE-2014-8133	2015-01-16 02:09:52 UTC (rev 3648)
+++ active/CVE-2014-8133	2015-01-16 18:01:43 UTC (rev 3649)
@@ -5,7 +5,7 @@
 upstream: released (3.19-rc1) [41bdc78544b8a93a9c6814b8bbbfef966272abbe]
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: released (3.2.66) [x86-tls-validate-tls-entries-to-protect-espfix.patch]

Modified: active/CVE-2014-9419
===================================================================
--- active/CVE-2014-9419	2015-01-16 02:09:52 UTC (rev 3648)
+++ active/CVE-2014-9419	2015-01-16 18:01:43 UTC (rev 3649)
@@ -5,7 +5,7 @@
 upstream: released (v3.19-rc1) [f647d7c155f069c1a068030255c300663516420e]
 2.6.32-upstream-stable:
 sid: released (3.16.7-ckt4-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/x86/x86_64-switch_to-load-tls-descriptors-before-switchi.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86_64-switch_to-load-tls-descriptors-before-switchi.patch]
 2.6.32-squeeze-security:
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable:

Modified: active/CVE-2014-9529
===================================================================
--- active/CVE-2014-9529	2015-01-16 02:09:52 UTC (rev 3648)
+++ active/CVE-2014-9529	2015-01-16 18:01:43 UTC (rev 3649)
@@ -6,7 +6,7 @@
 upstream: released (3.19-rc4) [a3a8784454692dd72e5d5d34dcdab17b4420e74c]
 2.6.32-upstream-stable: N/A "Vulnerable code not present"
 sid: released (3.16.7-ckt4-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/all/keys-close-race-between-key-lookup-and-freeing.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/all/keys-close-race-between-key-lookup-and-freeing.patch]
 2.6.32-squeeze-security: N/A "Vulnerable code not present"
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: needed

Modified: active/CVE-2014-9584
===================================================================
--- active/CVE-2014-9584	2015-01-16 02:09:52 UTC (rev 3648)
+++ active/CVE-2014-9584	2015-01-16 18:01:43 UTC (rev 3649)
@@ -5,7 +5,7 @@
 upstream: released (3.19-rc3) [4e2024624e678f0ebb916e6192bd23c1f9fdf696]
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt4-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt4)
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list