[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Uploading linux (3.2.63-1)



Ben Hutchings <ben@decadent.org.uk> schrieb:
>
> --=-6AOvsZRHpAv99mjPeare
> Content-Type: text/plain; charset="UTF-8"
> Content-Transfer-Encoding: quoted-printable
>
> I intend to upload linux version 3.2.63-1 to stable-proposed-updates
> later this week.  This will include all the fixes that went into stable
> updates 3.2.61-63 inclusive, including fixes for these security issues:
>
> CVE-2014-3181            HID/magicmouse: buffer overflow
> CVE-2014-3182            HID/logitech-dj: out-of-bounds read
> CVE-2014-3183/3184/3185  USB/serial/whiteheat: multiple buffer overflows
> CVE-2014-3186            HID/picolcd: buffer overflow
> CVE-2014-3601            kvm: guest-controllable memory leak
> CVE-2014-4171            shmem: reader can block hole punch indefinitely
> CVE-2014-4608            lzo: integer overflow
> CVE-2014-5077            sctp: remote denial of service
> CVE-2014-5471/5472       isofs: unbound recursion allowing stack overflow
> =20
> I also cherry-picked fixes for:
>
> CVE-2014-6410            udf: infinite loop when processing indirect ICBs
> CVE-2014-6416/6417/6418  libceph: buffer overflow and related bugs
>
> If any of these look serious enough, I could also prepare a security
> update.

As discussed earlier, scheduling these for the next point update is fine.

Cheers,
        Moritz


Reply to: