[kernel-sec-discuss] r3649 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Fri Jan 16 18:01:43 UTC 2015
Author: jmm
Date: 2015-01-16 18:01:43 +0000 (Fri, 16 Jan 2015)
New Revision: 3649
Modified:
active/CVE-2013-6885
active/CVE-2014-8133
active/CVE-2014-9419
active/CVE-2014-9529
active/CVE-2014-9584
Log:
record wheezy security update
Modified: active/CVE-2013-6885
===================================================================
--- active/CVE-2013-6885 2015-01-16 02:09:52 UTC (rev 3648)
+++ active/CVE-2013-6885 2015-01-16 18:01:43 UTC (rev 3649)
@@ -5,7 +5,7 @@
upstream: released (3.14-rc2) [3b56496865f9f7d9bcb2f93b44c63f274f08e3b6]
2.6.32-upstream-stable: needed
sid: released (3.14.2-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch]
2.6.32-squeeze-security: needed
3.16-upstream-stable: N/A "fixed before 3.16"
3.2-upstream-stable: needed
Modified: active/CVE-2014-8133
===================================================================
--- active/CVE-2014-8133 2015-01-16 02:09:52 UTC (rev 3648)
+++ active/CVE-2014-8133 2015-01-16 18:01:43 UTC (rev 3649)
@@ -5,7 +5,7 @@
upstream: released (3.19-rc1) [41bdc78544b8a93a9c6814b8bbbfef966272abbe]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86-tls-validate-tls-entries-to-protect-espfix.patch]
2.6.32-squeeze-security: needed
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: released (3.2.66) [x86-tls-validate-tls-entries-to-protect-espfix.patch]
Modified: active/CVE-2014-9419
===================================================================
--- active/CVE-2014-9419 2015-01-16 02:09:52 UTC (rev 3648)
+++ active/CVE-2014-9419 2015-01-16 18:01:43 UTC (rev 3649)
@@ -5,7 +5,7 @@
upstream: released (v3.19-rc1) [f647d7c155f069c1a068030255c300663516420e]
2.6.32-upstream-stable:
sid: released (3.16.7-ckt4-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/x86/x86_64-switch_to-load-tls-descriptors-before-switchi.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/x86/x86_64-switch_to-load-tls-descriptors-before-switchi.patch]
2.6.32-squeeze-security:
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable:
Modified: active/CVE-2014-9529
===================================================================
--- active/CVE-2014-9529 2015-01-16 02:09:52 UTC (rev 3648)
+++ active/CVE-2014-9529 2015-01-16 18:01:43 UTC (rev 3649)
@@ -6,7 +6,7 @@
upstream: released (3.19-rc4) [a3a8784454692dd72e5d5d34dcdab17b4420e74c]
2.6.32-upstream-stable: N/A "Vulnerable code not present"
sid: released (3.16.7-ckt4-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/all/keys-close-race-between-key-lookup-and-freeing.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/all/keys-close-race-between-key-lookup-and-freeing.patch]
2.6.32-squeeze-security: N/A "Vulnerable code not present"
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: needed
Modified: active/CVE-2014-9584
===================================================================
--- active/CVE-2014-9584 2015-01-16 02:09:52 UTC (rev 3648)
+++ active/CVE-2014-9584 2015-01-16 18:01:43 UTC (rev 3649)
@@ -5,7 +5,7 @@
upstream: released (3.19-rc3) [4e2024624e678f0ebb916e6192bd23c1f9fdf696]
2.6.32-upstream-stable: needed
sid: released (3.16.7-ckt4-1)
-3.2-wheezy-security: pending (3.2.65-1+deb7u1) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
+3.2-wheezy-security: released (3.2.65-1+deb7u1) [bugfix/all/isofs-fix-unchecked-printing-of-er-records.patch]
2.6.32-squeeze-security: needed
3.16-upstream-stable: released (3.16.7-ckt4)
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list