[kernel-sec-discuss] r3293 - active

Ben Hutchings benh at moszumanska.debian.org
Sun Apr 6 02:05:32 UTC 2014


Author: benh
Date: 2014-04-06 02:04:27 +0000 (Sun, 06 Apr 2014)
New Revision: 3293

Modified:
   active/CVE-2013-7339
   active/CVE-2014-0101
   active/CVE-2014-1874
   active/CVE-2014-2672
   active/CVE-2014-2706
Log:
Mark issues fixed in 3.2.56 as pending for wheezy in 3.2.56-1

Modified: active/CVE-2013-7339
===================================================================
--- active/CVE-2013-7339	2014-04-04 06:28:25 UTC (rev 3292)
+++ active/CVE-2013-7339	2014-04-06 02:04:27 UTC (rev 3293)
@@ -5,6 +5,6 @@
 upstream: released (3.13-rc4)
 2.6.32-upstream-stable:
 sid: released (3.13-1~exp1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.56-1)
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/rds-prevent-dereference-of-a-NULL-device.patch]
 3.2-upstream-stable: released (3.2.55)

Modified: active/CVE-2014-0101
===================================================================
--- active/CVE-2014-0101	2014-04-04 06:28:25 UTC (rev 3292)
+++ active/CVE-2014-0101	2014-04-06 02:04:27 UTC (rev 3293)
@@ -6,6 +6,6 @@
 upstream: released (3.14-rc3) [ec0223ec48a90cb605244b45f7c62de856403729]
 2.6.32-upstream-stable: needed
 sid: released (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.56-1)
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
 3.2-upstream-stable: released (3.2.56)

Modified: active/CVE-2014-1874
===================================================================
--- active/CVE-2014-1874	2014-04-04 06:28:25 UTC (rev 3292)
+++ active/CVE-2014-1874	2014-04-06 02:04:27 UTC (rev 3293)
@@ -7,6 +7,6 @@
 upstream: released (3.14-rc2) [2172fa709ab32ca60e86179dc67d0857be8e2c98]
 2.6.32-upstream-stable: needed
 sid: released (3.13.4-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.56-1)
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/SELinux-Fix-kernel-BUG-on-empty-security-contexts.patch]
 3.2-upstream-stable: released (3.2.56)

Modified: active/CVE-2014-2672
===================================================================
--- active/CVE-2014-2672	2014-04-04 06:28:25 UTC (rev 3292)
+++ active/CVE-2014-2672	2014-04-06 02:04:27 UTC (rev 3293)
@@ -5,6 +5,6 @@
 upstream: released (3.14-rc1) [21f8aaee0c62708654988ce092838aa7df4d25d8]
 2.6.32-upstream-stable: N/A "introduced in 3.0 by commit 5519541d5a5f"
 sid: released (3.13.17-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.56-1)
 2.6.32-squeeze-security: N/A "introduced in 3.0 by commit 5519541d5a5f"
 3.2-upstream-stable: released (3.2.56)

Modified: active/CVE-2014-2706
===================================================================
--- active/CVE-2014-2706	2014-04-04 06:28:25 UTC (rev 3292)
+++ active/CVE-2014-2706	2014-04-06 02:04:27 UTC (rev 3293)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.14-rc6) [1d147bfa64293b2723c4fec50922168658e613ba]
 2.6.32-upstream-stable:
-sid:
-3.2-wheezy-security:
+sid: released (3.13.7-1)
+3.2-wheezy-security: pending (3.2.56-1)
 2.6.32-squeeze-security:
 3.2-upstream-stable: released (3.2.56)




More information about the kernel-sec-discuss mailing list