[kernel-sec-discuss] r3472 - active

Ben Hutchings benh at moszumanska.debian.org
Tue Aug 26 23:13:00 UTC 2014


Author: benh
Date: 2014-08-26 23:13:00 +0000 (Tue, 26 Aug 2014)
New Revision: 3472

Modified:
   active/CVE-2014-0181
Log:
Ignore CVE-2014-0181 for 3.2

Several people attempted to backport the fixes to 3.4, but so far
they have failed:

http://thread.gmane.org/gmane.linux.network/324569
http://thread.gmane.org/gmane.linux.kernel.stable/102603

Based on this, I'm assuming this isn't going to be fixed in 3.2
either.


Modified: active/CVE-2014-0181
===================================================================
--- active/CVE-2014-0181	2014-08-26 23:05:23 UTC (rev 3471)
+++ active/CVE-2014-0181	2014-08-26 23:13:00 UTC (rev 3472)
@@ -5,6 +5,6 @@
 upstream: released (3.15-rc5) [90f62cf30a78721641e08737bda787552428061e, 5187cd055b6e81fc6526109456f8b20623148d5f, a53b72c83a4216f2eb883ed45a0cbce014b8e62d, a3b299da869d6e78cf42ae0b1b41797bcb8c5e4b, aa4cf9452f469f16cea8c96283b641b4576d4a7b]
 2.6.32-upstream-stable: ignored "too intrusive to backport"
 sid: released (3.14.9-1)
-3.2-wheezy-security:
+3.2-wheezy-security: ignored "too intrusive to backport"
 2.6.32-squeeze-security: ignored "too intrusive to backport"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: ignored "too intrusive to backport"




More information about the kernel-sec-discuss mailing list