[kernel-sec-discuss] r3308 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Tue Apr 15 05:09:23 UTC 2014
Author: jmm
Date: 2014-04-15 05:09:23 +0000 (Tue, 15 Apr 2014)
New Revision: 3308
Modified:
active/CVE-2013-4483
active/CVE-2013-7339
active/CVE-2014-0055
active/CVE-2014-0069
active/CVE-2014-0077
active/CVE-2014-0101
active/CVE-2014-0131
active/CVE-2014-1874
active/CVE-2014-2039
active/CVE-2014-2309
active/CVE-2014-2523
active/CVE-2014-2672
active/CVE-2014-2678
active/CVE-2014-2706
Log:
mark wheezy as released now it's in s-p-u
Modified: active/CVE-2013-4483
===================================================================
--- active/CVE-2013-4483 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2013-4483 2014-04-15 05:09:23 UTC (rev 3308)
@@ -7,6 +7,6 @@
upstream: released (3.10) [6062a8dc0517bce23e3c2f7d2fea5e22411269a3]
2.6.32-upstream-stable: ignored "too intrusive to backport"
sid: released (3.10-1)
-3.2-wheezy-security: pending (3.2.57-1) [bugfix/all/ipc-msg-fix-race-around-refcount.patch]
+3.2-wheezy-security: released (3.2.57-1) [bugfix/all/ipc-msg-fix-race-around-refcount.patch]
2.6.32-squeeze-security: ignored "too intrusive to backport"
3.2-upstream-stable: released (3.2.57) [ipc-msg-fix-race-around-refcount.patch]
Modified: active/CVE-2013-7339
===================================================================
--- active/CVE-2013-7339 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2013-7339 2014-04-15 05:09:23 UTC (rev 3308)
@@ -5,6 +5,6 @@
upstream: released (3.13-rc4)
2.6.32-upstream-stable:
sid: released (3.13-1~exp1)
-3.2-wheezy-security: pending (3.2.56-1)
+3.2-wheezy-security: released (3.2.56-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/rds-prevent-dereference-of-a-NULL-device.patch]
3.2-upstream-stable: released (3.2.55)
Modified: active/CVE-2014-0055
===================================================================
--- active/CVE-2014-0055 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-0055 2014-04-15 05:09:23 UTC (rev 3308)
@@ -7,6 +7,6 @@
upstream: released (3.14) [a39ee449f96a2cd44ce056d8a0a112211a9b1a1f]
2.6.32-upstream-stable: N/A "vhost_net introduced in 2.6.33"
sid: pending (3.13.8-1) [bugfix/all/vhost-validate-vhost_get_vq_desc-return-value.patch]
-3.2-wheezy-security: pending (3.2.57-1) [bugfix/all/vhost-validate-vhost_get_vq_desc-return-value.patch]
+3.2-wheezy-security: released (3.2.57-1) [bugfix/all/vhost-validate-vhost_get_vq_desc-return-value.patch]
2.6.32-squeeze-security: N/A "vhost_net introduced in 2.6.33"
3.2-upstream-stable: pending (3.2.58) [vhost-validate-vhost_get_vq_desc-return-value.patch]
Modified: active/CVE-2014-0069
===================================================================
--- active/CVE-2014-0069 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-0069 2014-04-15 05:09:23 UTC (rev 3308)
@@ -6,6 +6,6 @@
upstream: released (3.14-rc4) [5d81de8e8667da7135d3a32a964087c0faf5483f]
2.6.32-upstream-stable: N/A "Only affects 2.6.38 and later"
sid: released (3.13.6-1)
-3.2-wheezy-security: pending (3.2.57-1)
+3.2-wheezy-security: released (3.2.57-1)
2.6.32-squeeze-security: N/A "Only affects 2.6.38 and later"
3.2-upstream-stable: released (3.2.57) [cifs-ensure-that-uncached-writes-handle-unmapped-areas-correctly.patch]
Modified: active/CVE-2014-0077
===================================================================
--- active/CVE-2014-0077 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-0077 2014-04-15 05:09:23 UTC (rev 3308)
@@ -6,6 +6,6 @@
upstream: released (3.14) [d8316f3991d207fe32881a9ac20241be8fa2bad0]
2.6.32-upstream-stable: N/A "vhost_net introduced in 2.6.33"
sid: pending (3.13.8-1) [bugfix/all/vhost-fix-total-length-when-packets-are-too-short.patch]
-3.2-wheezy-security: pending (3.2.57-1) [bugfix/all/vhost-fix-total-length-when-packets-are-too-short.patch]
+3.2-wheezy-security: released (3.2.57-1) [bugfix/all/vhost-fix-total-length-when-packets-are-too-short.patch]
2.6.32-squeeze-security: N/A "vhost_net introduced in 2.6.33"
3.2-upstream-stable: pending (3.2.58) [vhost-fix-total-length-when-packets-are-too-short.patch]
Modified: active/CVE-2014-0101
===================================================================
--- active/CVE-2014-0101 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-0101 2014-04-15 05:09:23 UTC (rev 3308)
@@ -6,6 +6,6 @@
upstream: released (3.14-rc3) [ec0223ec48a90cb605244b45f7c62de856403729]
2.6.32-upstream-stable: needed
sid: released (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
-3.2-wheezy-security: pending (3.2.56-1)
+3.2-wheezy-security: released (3.2.56-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
3.2-upstream-stable: released (3.2.56)
Modified: active/CVE-2014-0131
===================================================================
--- active/CVE-2014-0131 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-0131 2014-04-15 05:09:23 UTC (rev 3308)
@@ -6,6 +6,6 @@
upstream: released (3.14-rc7) [8cb19905e9287a93ce7c2cbbdf742a060b00e219, 4e1beba12d094c6c761ba5c49032b9b9e46380e8, df5771ffefb13f8af5392bd54fd7e2b596a3a357, 1a4cedaf65491e66e1e55b8428c89209da729209, 1fd819ecb90cc9b822cd84d3056ddba315d3340f]
2.6.32-upstream-stable: N/A "zerocopy introduced in 3.1"
sid: released (3.13.6-1) [bugfix/all/net-use-kfree_skb_list-helper.patch, bugfix/all/0001-skbuff-skb_segment-s-frag-nskb_frag.patch, bugfix/all/0002-skbuff-skb_segment-s-skb_frag-frag.patch, bugfix/all/0003-skbuff-skb_segment-s-skb-head_skb.patch, bugfix/all/0004-skbuff-skb_segment-s-fskb-list_skb.patch, bugfix/all/0005-skbuff-skb_segment-orphan-frags-before-copying.patch]
-3.2-wheezy-security: pending (3.2.57-1) [bugfix/all/skbuff-skb_segment-orphan-frags-before-copying.patch]
+3.2-wheezy-security: released (3.2.57-1) [bugfix/all/skbuff-skb_segment-orphan-frags-before-copying.patch]
2.6.32-squeeze-security: N/A "zerocopy introduced in 3.1"
3.2-upstream-stable:
Modified: active/CVE-2014-1874
===================================================================
--- active/CVE-2014-1874 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-1874 2014-04-15 05:09:23 UTC (rev 3308)
@@ -7,6 +7,6 @@
upstream: released (3.14-rc2) [2172fa709ab32ca60e86179dc67d0857be8e2c98]
2.6.32-upstream-stable: needed
sid: released (3.13.4-1)
-3.2-wheezy-security: pending (3.2.56-1)
+3.2-wheezy-security: released (3.2.56-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/SELinux-Fix-kernel-BUG-on-empty-security-contexts.patch]
3.2-upstream-stable: released (3.2.56)
Modified: active/CVE-2014-2039
===================================================================
--- active/CVE-2014-2039 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-2039 2014-04-15 05:09:23 UTC (rev 3308)
@@ -5,6 +5,6 @@
upstream: released (3.14-rc2) [8d7f6690cedb83456edd41c9bd583783f0703bf0]
2.6.32-upstream-stable:
sid: released (3.13.5-1)
-3.2-wheezy-security: pending (3.2.57-1)
+3.2-wheezy-security: released (3.2.57-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/s390/fix-kernel-crash-due-to-linkage-stack-instructi.patch]
3.2-upstream-stable: released (3.2.57) [s390-fix-kernel-crash-due-to-linkage-stack-instructions.patch]
Modified: active/CVE-2014-2309
===================================================================
--- active/CVE-2014-2309 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-2309 2014-04-15 05:09:23 UTC (rev 3308)
@@ -6,6 +6,6 @@
upstream: released (3.14-rc4) [c88507fbad8055297c1d1e21e599f46960cbee39]
2.6.32-upstream-stable: N/A "Introduced in 3.0 with 957c665f37007de93ccbe45902a23143724170d0"
sid: released (3.13.6-1) [bugfix/all/ipv6-don-t-set-DST_NOCOUNT-for-remotely-added-routes.patch]
-3.2-wheezy-security: pending (3.2.57-1) [bugfix/all/ipv6-don-t-set-dst_nocount-for-remotely-added-routes.patch]
+3.2-wheezy-security: released (3.2.57-1) [bugfix/all/ipv6-don-t-set-dst_nocount-for-remotely-added-routes.patch]
2.6.32-squeeze-security: N/A "Introduced in 3.0 with 957c665f37007de93ccbe45902a23143724170d0"
3.2-upstream-stable: pending (3.2.58) [ipv6-don-t-set-dst_nocount-for-remotely-added-routes.patch]
Modified: active/CVE-2014-2523
===================================================================
--- active/CVE-2014-2523 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-2523 2014-04-15 05:09:23 UTC (rev 3308)
@@ -5,6 +5,6 @@
upstream: released (3.13-rc4) [b22f5126a24b3b2f15448c3f2a254fc10cbc2b92]
2.6.32-upstream-stable: needed
sid: released (3.13-1~exp1)
-3.2-wheezy-security: pending (3.2.57-1)
+3.2-wheezy-security: released (3.2.57-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/netfilter-nf_conntrack_dccp-fix-skb_header_pointer-A.patch]
3.2-upstream-stable: released (3.2.57) [netfilter-nf_conntrack_dccp-fix-skb_header_pointer-api-usages.patch]
Modified: active/CVE-2014-2672
===================================================================
--- active/CVE-2014-2672 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-2672 2014-04-15 05:09:23 UTC (rev 3308)
@@ -5,6 +5,6 @@
upstream: released (3.14-rc1) [21f8aaee0c62708654988ce092838aa7df4d25d8]
2.6.32-upstream-stable: N/A "introduced in 3.0 by commit 5519541d5a5f"
sid: released (3.13.17-1)
-3.2-wheezy-security: pending (3.2.56-1)
+3.2-wheezy-security: released (3.2.56-1)
2.6.32-squeeze-security: N/A "introduced in 3.0 by commit 5519541d5a5f"
3.2-upstream-stable: released (3.2.56)
Modified: active/CVE-2014-2678
===================================================================
--- active/CVE-2014-2678 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-2678 2014-04-15 05:09:23 UTC (rev 3308)
@@ -6,6 +6,6 @@
upstream: pending (3.15-rc1) [bf39b4247b8799935ea91d90db250ab608a58e50]
2.6.32-upstream-stable:
sid:
-3.2-wheezy-security: pending (3.2.57-1) [bugfix/all/rds-prevent-dereference-of-a-null-device-in-rds_iw_laddr_check.patch]
+3.2-wheezy-security: released (3.2.57-1) [bugfix/all/rds-prevent-dereference-of-a-null-device-in-rds_iw_laddr_check.patch]
2.6.32-squeeze-security:
3.2-upstream-stable: pending (3.2.58) [rds-prevent-dereference-of-a-null-device-in-rds_iw_laddr_check.patch]
Modified: active/CVE-2014-2706
===================================================================
--- active/CVE-2014-2706 2014-04-14 21:21:27 UTC (rev 3307)
+++ active/CVE-2014-2706 2014-04-15 05:09:23 UTC (rev 3308)
@@ -6,6 +6,6 @@
upstream: released (3.14-rc6) [1d147bfa64293b2723c4fec50922168658e613ba]
2.6.32-upstream-stable:
sid: released (3.13.7-1)
-3.2-wheezy-security: pending (3.2.56-1)
+3.2-wheezy-security: released (3.2.56-1)
2.6.32-squeeze-security:
3.2-upstream-stable: released (3.2.56)
More information about the kernel-sec-discuss
mailing list