Re: Uploading linux (3.2.63-1)
On Sun, 2014-09-28 at 18:42 +0100, Adam D. Barratt wrote: On Wed, 2014-09-24 at 03:54 +0100, Ben Hutchings wrote: I intend to upload linux version 3.2.63-1 to stable-proposed-updates later this week. This will include all the fixes that went into stable updates 3.2.61-63 inclusive, including fixes for these security issues: [...] Flagged for acceptance in to p-u; thanks. and built everywhere except s390{,x}, where it failed with an ABI change. Regards, Adam -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1412015358.25283.14.ca...@jacala.jungle.funky-badger.org
Re: Uploading linux (3.2.63-1)
On Mon, 2014-09-29 at 19:29 +0100, Adam D. Barratt wrote: On Sun, 2014-09-28 at 18:42 +0100, Adam D. Barratt wrote: On Wed, 2014-09-24 at 03:54 +0100, Ben Hutchings wrote: I intend to upload linux version 3.2.63-1 to stable-proposed-updates later this week. This will include all the fixes that went into stable updates 3.2.61-63 inclusive, including fixes for these security issues: [...] Flagged for acceptance in to p-u; thanks. and built everywhere except s390{,x}, where it failed with an ABI change. We can ignore that change, but I forgot to do that. (We had the same build failure in 3.14.10-1.) Ben. -- Ben Hutchings Logic doesn't apply to the real world. - Marvin Minsky signature.asc Description: This is a digitally signed message part
Re: Uploading linux (3.2.63-1)
On Mon, 2014-09-29 at 23:24 +0100, Ben Hutchings wrote: On Mon, 2014-09-29 at 19:29 +0100, Adam D. Barratt wrote: On Sun, 2014-09-28 at 18:42 +0100, Adam D. Barratt wrote: On Wed, 2014-09-24 at 03:54 +0100, Ben Hutchings wrote: I intend to upload linux version 3.2.63-1 to stable-proposed-updates later this week. This will include all the fixes that went into stable updates 3.2.61-63 inclusive, including fixes for these security issues: [...] Flagged for acceptance in to p-u; thanks. and built everywhere except s390{,x}, where it failed with an ABI change. We can ignore that change, but I forgot to do that. (We had the same build failure in 3.14.10-1.) I've flagged 3.2.63-2, including the fix, for acceptance; thanks for the quick turn-around. Regards, Adam -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1412055407.25283.19.ca...@jacala.jungle.funky-badger.org
Re: Uploading linux (3.2.63-1)
On Wed, 2014-09-24 at 03:54 +0100, Ben Hutchings wrote: I intend to upload linux version 3.2.63-1 to stable-proposed-updates later this week. This will include all the fixes that went into stable updates 3.2.61-63 inclusive, including fixes for these security issues: [...] Flagged for acceptance in to p-u; thanks. Regards, Adam -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/1411926130.25283.10.ca...@jacala.jungle.funky-badger.org
Re: Uploading linux (3.2.63-1)
Ben Hutchings b...@decadent.org.uk schrieb: --=-6AOvsZRHpAv99mjPeare Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable I intend to upload linux version 3.2.63-1 to stable-proposed-updates later this week. This will include all the fixes that went into stable updates 3.2.61-63 inclusive, including fixes for these security issues: CVE-2014-3181HID/magicmouse: buffer overflow CVE-2014-3182HID/logitech-dj: out-of-bounds read CVE-2014-3183/3184/3185 USB/serial/whiteheat: multiple buffer overflows CVE-2014-3186HID/picolcd: buffer overflow CVE-2014-3601kvm: guest-controllable memory leak CVE-2014-4171shmem: reader can block hole punch indefinitely CVE-2014-4608lzo: integer overflow CVE-2014-5077sctp: remote denial of service CVE-2014-5471/5472 isofs: unbound recursion allowing stack overflow =20 I also cherry-picked fixes for: CVE-2014-6410udf: infinite loop when processing indirect ICBs CVE-2014-6416/6417/6418 libceph: buffer overflow and related bugs If any of these look serious enough, I could also prepare a security update. As discussed earlier, scheduling these for the next point update is fine. Cheers, Moritz -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/slrnm25p7o.33m@inutil.org
Uploading linux (3.2.63-1)
I intend to upload linux version 3.2.63-1 to stable-proposed-updates later this week. This will include all the fixes that went into stable updates 3.2.61-63 inclusive, including fixes for these security issues: CVE-2014-3181HID/magicmouse: buffer overflow CVE-2014-3182HID/logitech-dj: out-of-bounds read CVE-2014-3183/3184/3185 USB/serial/whiteheat: multiple buffer overflows CVE-2014-3186HID/picolcd: buffer overflow CVE-2014-3601kvm: guest-controllable memory leak CVE-2014-4171shmem: reader can block hole punch indefinitely CVE-2014-4608lzo: integer overflow CVE-2014-5077sctp: remote denial of service CVE-2014-5471/5472 isofs: unbound recursion allowing stack overflow I also cherry-picked fixes for: CVE-2014-6410udf: infinite loop when processing indirect ICBs CVE-2014-6416/6417/6418 libceph: buffer overflow and related bugs If any of these look serious enough, I could also prepare a security update. Ben. -- Ben Hutchings Everything should be made as simple as possible, but not simpler. - Albert Einstein signature.asc Description: This is a digitally signed message part