[kernel-sec-discuss] r3293 - active
Ben Hutchings
benh at moszumanska.debian.org
Sun Apr 6 02:05:32 UTC 2014
Author: benh
Date: 2014-04-06 02:04:27 +0000 (Sun, 06 Apr 2014)
New Revision: 3293
Modified:
active/CVE-2013-7339
active/CVE-2014-0101
active/CVE-2014-1874
active/CVE-2014-2672
active/CVE-2014-2706
Log:
Mark issues fixed in 3.2.56 as pending for wheezy in 3.2.56-1
Modified: active/CVE-2013-7339
===================================================================
--- active/CVE-2013-7339 2014-04-04 06:28:25 UTC (rev 3292)
+++ active/CVE-2013-7339 2014-04-06 02:04:27 UTC (rev 3293)
@@ -5,6 +5,6 @@
upstream: released (3.13-rc4)
2.6.32-upstream-stable:
sid: released (3.13-1~exp1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.56-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/rds-prevent-dereference-of-a-NULL-device.patch]
3.2-upstream-stable: released (3.2.55)
Modified: active/CVE-2014-0101
===================================================================
--- active/CVE-2014-0101 2014-04-04 06:28:25 UTC (rev 3292)
+++ active/CVE-2014-0101 2014-04-06 02:04:27 UTC (rev 3293)
@@ -6,6 +6,6 @@
upstream: released (3.14-rc3) [ec0223ec48a90cb605244b45f7c62de856403729]
2.6.32-upstream-stable: needed
sid: released (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.56-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
3.2-upstream-stable: released (3.2.56)
Modified: active/CVE-2014-1874
===================================================================
--- active/CVE-2014-1874 2014-04-04 06:28:25 UTC (rev 3292)
+++ active/CVE-2014-1874 2014-04-06 02:04:27 UTC (rev 3293)
@@ -7,6 +7,6 @@
upstream: released (3.14-rc2) [2172fa709ab32ca60e86179dc67d0857be8e2c98]
2.6.32-upstream-stable: needed
sid: released (3.13.4-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.56-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/SELinux-Fix-kernel-BUG-on-empty-security-contexts.patch]
3.2-upstream-stable: released (3.2.56)
Modified: active/CVE-2014-2672
===================================================================
--- active/CVE-2014-2672 2014-04-04 06:28:25 UTC (rev 3292)
+++ active/CVE-2014-2672 2014-04-06 02:04:27 UTC (rev 3293)
@@ -5,6 +5,6 @@
upstream: released (3.14-rc1) [21f8aaee0c62708654988ce092838aa7df4d25d8]
2.6.32-upstream-stable: N/A "introduced in 3.0 by commit 5519541d5a5f"
sid: released (3.13.17-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.56-1)
2.6.32-squeeze-security: N/A "introduced in 3.0 by commit 5519541d5a5f"
3.2-upstream-stable: released (3.2.56)
Modified: active/CVE-2014-2706
===================================================================
--- active/CVE-2014-2706 2014-04-04 06:28:25 UTC (rev 3292)
+++ active/CVE-2014-2706 2014-04-06 02:04:27 UTC (rev 3293)
@@ -5,7 +5,7 @@
Bugs:
upstream: released (3.14-rc6) [1d147bfa64293b2723c4fec50922168658e613ba]
2.6.32-upstream-stable:
-sid:
-3.2-wheezy-security:
+sid: released (3.13.7-1)
+3.2-wheezy-security: pending (3.2.56-1)
2.6.32-squeeze-security:
3.2-upstream-stable: released (3.2.56)
More information about the kernel-sec-discuss
mailing list