Re: Security fixes for 2.6.32-stable

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Ben,

On Sun, Dec 27, 2015 at 08:45:42PM +0000, Ben Hutchings wrote:
> Willy, here are the security patches I've recently applied to Debian's
> 2.6.32 branch, aside from issues not yet fixed upstream.
> 
> These have already been released without reported regressions. The
> mapping to CVE IDs is:
> 
>   * isdn_ppp: Add checks for allocation failure in isdn_ppp_open()
>     (dependency of following fix)
>   * ppp, slip: Validate VJ compression slot parameters completely
>     (CVE-2015-7799)
>   * RDS: fix race condition when sending a message on unbound socket
>    
>  (CVE-2015-7990)
>   * unix: avoid use-after-free in ep_remove_wait_queue
> (CVE-2013-7446)
>   * ext4: Fix null dereference in ext4_fill_super()
> (CVE-2015-8324)

Just queued now, thank you!

Willy

--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]