[kernel-sec-discuss] r3459 - active
Ben Hutchings
benh at moszumanska.debian.org
Sun Aug 3 01:09:52 UTC 2014
Author: benh
Date: 2014-08-03 01:09:52 +0000 (Sun, 03 Aug 2014)
New Revision: 3459
Modified:
active/CVE-2014-3534
active/CVE-2014-4171
active/CVE-2014-4943
Log:
Mark patches pending in 3.2.62
Modified: active/CVE-2014-3534
===================================================================
--- active/CVE-2014-3534 2014-08-01 10:35:34 UTC (rev 3458)
+++ active/CVE-2014-3534 2014-08-03 01:09:52 UTC (rev 3459)
@@ -15,4 +15,4 @@
sid: released (3.14.13-2) [bugfix/s390/s390-ptrace-fix-PSW-mask-check.patch]
3.2-wheezy-security: released (3.2.60-1+deb7u3) [bugfix/s390/s390-ptrace-fix-PSW-mask-check.patch]
2.6.32-squeeze-security: N/A ("vulnerable code not present")
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.62) [s390-ptrace-fix-PSW-mask-check.patch]
Modified: active/CVE-2014-4171
===================================================================
--- active/CVE-2014-4171 2014-08-01 10:35:34 UTC (rev 3458)
+++ active/CVE-2014-4171 2014-08-03 01:09:52 UTC (rev 3459)
@@ -11,4 +11,5 @@
sid: needed
3.2-wheezy-security:
2.6.32-squeeze-security: N/A "Vulnerable code introduced later"
-3.2-upstream-stable:
+3.2-upstream-stable: pending (3.2.62) [shmem-fix-faulting-into-a-hole-while-it-s-punched.patch, shmem-fix-faulting-into-a-hole-not-taking-i_mutex.patch, shmem-fix-splicing-from-a-hole-while-it-s-punched.patch]
+
Modified: active/CVE-2014-4943
===================================================================
--- active/CVE-2014-4943 2014-08-01 10:35:34 UTC (rev 3458)
+++ active/CVE-2014-4943 2014-08-03 01:09:52 UTC (rev 3459)
@@ -7,4 +7,4 @@
sid: released (3.14.13-1) [bugfix/all/net-l2tp-don-t-fall-back-on-UDP-get-set-sockopt.patch]
3.2-wheezy-security: released (3.2.60-1+deb7u3) [bugfix/all/net-l2tp-don-t-fall-back-on-UDP-get-set-sockopt.patch]
2.6.32-squeeze-security: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.62) [net-l2tp-don-t-fall-back-on-udp-sockopt.patch]
More information about the kernel-sec-discuss
mailing list