[kernel-sec-discuss] r3311 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed Apr 16 06:18:26 UTC 2014


Author: jmm
Date: 2014-04-16 06:18:25 +0000 (Wed, 16 Apr 2014)
New Revision: 3311

Modified:
   active/CVE-2014-0055
   active/CVE-2014-0077
   active/CVE-2014-2523
   active/CVE-2014-2678
Log:
fixes from sid upload


Modified: active/CVE-2014-0055
===================================================================
--- active/CVE-2014-0055	2014-04-16 06:10:42 UTC (rev 3310)
+++ active/CVE-2014-0055	2014-04-16 06:18:25 UTC (rev 3311)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (3.14) [a39ee449f96a2cd44ce056d8a0a112211a9b1a1f]
 2.6.32-upstream-stable: N/A "vhost_net introduced in 2.6.33"
-sid: pending (3.13.8-1) [bugfix/all/vhost-validate-vhost_get_vq_desc-return-value.patch]
+sid: released (3.13.8-1) [bugfix/all/vhost-validate-vhost_get_vq_desc-return-value.patch]
 3.2-wheezy-security: released (3.2.57-1) [bugfix/all/vhost-validate-vhost_get_vq_desc-return-value.patch]
 2.6.32-squeeze-security: N/A "vhost_net introduced in 2.6.33"
 3.2-upstream-stable: pending (3.2.58) [vhost-validate-vhost_get_vq_desc-return-value.patch]

Modified: active/CVE-2014-0077
===================================================================
--- active/CVE-2014-0077	2014-04-16 06:10:42 UTC (rev 3310)
+++ active/CVE-2014-0077	2014-04-16 06:18:25 UTC (rev 3311)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.14) [d8316f3991d207fe32881a9ac20241be8fa2bad0]
 2.6.32-upstream-stable: N/A "vhost_net introduced in 2.6.33"
-sid: pending (3.13.8-1) [bugfix/all/vhost-fix-total-length-when-packets-are-too-short.patch]
+sid: released (3.13.8-1) [bugfix/all/vhost-fix-total-length-when-packets-are-too-short.patch]
 3.2-wheezy-security: released (3.2.57-1) [bugfix/all/vhost-fix-total-length-when-packets-are-too-short.patch]
 2.6.32-squeeze-security: N/A "vhost_net introduced in 2.6.33"
 3.2-upstream-stable: pending (3.2.58) [vhost-fix-total-length-when-packets-are-too-short.patch]

Modified: active/CVE-2014-2523
===================================================================
--- active/CVE-2014-2523	2014-04-16 06:10:42 UTC (rev 3310)
+++ active/CVE-2014-2523	2014-04-16 06:18:25 UTC (rev 3311)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.13-rc4) [b22f5126a24b3b2f15448c3f2a254fc10cbc2b92]
 2.6.32-upstream-stable: needed
-sid: released (3.13-1~exp1)
+sid: released (3.13.10-1)
 3.2-wheezy-security: released (3.2.57-1)
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/netfilter-nf_conntrack_dccp-fix-skb_header_pointer-A.patch]
 3.2-upstream-stable: released (3.2.57) [netfilter-nf_conntrack_dccp-fix-skb_header_pointer-api-usages.patch]

Modified: active/CVE-2014-2678
===================================================================
--- active/CVE-2014-2678	2014-04-16 06:10:42 UTC (rev 3310)
+++ active/CVE-2014-2678	2014-04-16 06:18:25 UTC (rev 3311)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: pending (3.15-rc1) [bf39b4247b8799935ea91d90db250ab608a58e50]
 2.6.32-upstream-stable:
-sid:
+sid: released (3.13.10-1)
 3.2-wheezy-security: released (3.2.57-1) [bugfix/all/rds-prevent-dereference-of-a-null-device-in-rds_iw_laddr_check.patch]
 2.6.32-squeeze-security:
 3.2-upstream-stable: pending (3.2.58) [rds-prevent-dereference-of-a-null-device-in-rds_iw_laddr_check.patch]




More information about the kernel-sec-discuss mailing list