Uploading linux (3.2.63-1)

2014-09-23 Thread Ben Hutchings
I intend to upload linux version 3.2.63-1 to stable-proposed-updates
later this week.  This will include all the fixes that went into stable
updates 3.2.61-63 inclusive, including fixes for these security issues:

CVE-2014-3181HID/magicmouse: buffer overflow
CVE-2014-3182HID/logitech-dj: out-of-bounds read
CVE-2014-3183/3184/3185  USB/serial/whiteheat: multiple buffer overflows
CVE-2014-3186HID/picolcd: buffer overflow
CVE-2014-3601kvm: guest-controllable memory leak
CVE-2014-4171shmem: reader can block hole punch indefinitely
CVE-2014-4608lzo: integer overflow
CVE-2014-5077sctp: remote denial of service
CVE-2014-5471/5472   isofs: unbound recursion allowing stack overflow
  
I also cherry-picked fixes for:

CVE-2014-6410udf: infinite loop when processing indirect ICBs
CVE-2014-6416/6417/6418  libceph: buffer overflow and related bugs

If any of these look serious enough, I could also prepare a security
update.

Ben.

-- 
Ben Hutchings
Everything should be made as simple as possible, but not simpler.
   - Albert Einstein


signature.asc
Description: This is a digitally signed message part


Re: Uploading linux (3.2.63-1)

2014-09-24 Thread Moritz Mühlenhoff
Ben Hutchings  schrieb:
>
> --=-6AOvsZRHpAv99mjPeare
> Content-Type: text/plain; charset="UTF-8"
> Content-Transfer-Encoding: quoted-printable
>
> I intend to upload linux version 3.2.63-1 to stable-proposed-updates
> later this week.  This will include all the fixes that went into stable
> updates 3.2.61-63 inclusive, including fixes for these security issues:
>
> CVE-2014-3181HID/magicmouse: buffer overflow
> CVE-2014-3182HID/logitech-dj: out-of-bounds read
> CVE-2014-3183/3184/3185  USB/serial/whiteheat: multiple buffer overflows
> CVE-2014-3186HID/picolcd: buffer overflow
> CVE-2014-3601kvm: guest-controllable memory leak
> CVE-2014-4171shmem: reader can block hole punch indefinitely
> CVE-2014-4608lzo: integer overflow
> CVE-2014-5077sctp: remote denial of service
> CVE-2014-5471/5472   isofs: unbound recursion allowing stack overflow
> =20
> I also cherry-picked fixes for:
>
> CVE-2014-6410udf: infinite loop when processing indirect ICBs
> CVE-2014-6416/6417/6418  libceph: buffer overflow and related bugs
>
> If any of these look serious enough, I could also prepare a security
> update.

As discussed earlier, scheduling these for the next point update is fine.

Cheers,
Moritz


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/slrnm25p7o.33m@inutil.org



Re: Uploading linux (3.2.63-1)

2014-09-28 Thread Adam D. Barratt
On Wed, 2014-09-24 at 03:54 +0100, Ben Hutchings wrote:
> I intend to upload linux version 3.2.63-1 to stable-proposed-updates
> later this week.  This will include all the fixes that went into stable
> updates 3.2.61-63 inclusive, including fixes for these security issues:
[...]

Flagged for acceptance in to p-u; thanks.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/1411926130.25283.10.ca...@jacala.jungle.funky-badger.org



Re: Uploading linux (3.2.63-1)

2014-09-29 Thread Adam D. Barratt
On Sun, 2014-09-28 at 18:42 +0100, Adam D. Barratt wrote:
> On Wed, 2014-09-24 at 03:54 +0100, Ben Hutchings wrote:
> > I intend to upload linux version 3.2.63-1 to stable-proposed-updates
> > later this week.  This will include all the fixes that went into stable
> > updates 3.2.61-63 inclusive, including fixes for these security issues:
> [...]
> 
> Flagged for acceptance in to p-u; thanks.

and built everywhere except s390{,x}, where it failed with an ABI
change.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/1412015358.25283.14.ca...@jacala.jungle.funky-badger.org



Re: Uploading linux (3.2.63-1)

2014-09-29 Thread Ben Hutchings
On Mon, 2014-09-29 at 19:29 +0100, Adam D. Barratt wrote:
> On Sun, 2014-09-28 at 18:42 +0100, Adam D. Barratt wrote:
> > On Wed, 2014-09-24 at 03:54 +0100, Ben Hutchings wrote:
> > > I intend to upload linux version 3.2.63-1 to stable-proposed-updates
> > > later this week.  This will include all the fixes that went into stable
> > > updates 3.2.61-63 inclusive, including fixes for these security issues:
> > [...]
> > 
> > Flagged for acceptance in to p-u; thanks.
> 
> and built everywhere except s390{,x}, where it failed with an ABI
> change.

We can ignore that change, but I forgot to do that.  (We had the same
build failure in 3.14.10-1.)

Ben.

-- 
Ben Hutchings
Logic doesn't apply to the real world. - Marvin Minsky


signature.asc
Description: This is a digitally signed message part


Re: Uploading linux (3.2.63-1)

2014-09-29 Thread Adam D. Barratt
On Mon, 2014-09-29 at 23:24 +0100, Ben Hutchings wrote:
> On Mon, 2014-09-29 at 19:29 +0100, Adam D. Barratt wrote:
> > On Sun, 2014-09-28 at 18:42 +0100, Adam D. Barratt wrote:
> > > On Wed, 2014-09-24 at 03:54 +0100, Ben Hutchings wrote:
> > > > I intend to upload linux version 3.2.63-1 to stable-proposed-updates
> > > > later this week.  This will include all the fixes that went into stable
> > > > updates 3.2.61-63 inclusive, including fixes for these security issues:
> > > [...]
> > > 
> > > Flagged for acceptance in to p-u; thanks.
> > 
> > and built everywhere except s390{,x}, where it failed with an ABI
> > change.
> 
> We can ignore that change, but I forgot to do that.  (We had the same
> build failure in 3.14.10-1.)

I've flagged 3.2.63-2, including the fix, for acceptance; thanks for the
quick turn-around.

Regards,

Adam


-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/1412055407.25283.19.ca...@jacala.jungle.funky-badger.org