[kernel-sec-discuss] r3205 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Tue Jan 7 07:41:31 UTC 2014
Author: jmm
Date: 2014-01-07 07:40:28 +0000 (Tue, 07 Jan 2014)
New Revision: 3205
Modified:
active/CVE-2012-2372
active/CVE-2013-4483
Log:
ignore two issues for 2.6.32.x
Modified: active/CVE-2012-2372
===================================================================
--- active/CVE-2012-2372 2014-01-07 07:04:12 UTC (rev 3204)
+++ active/CVE-2012-2372 2014-01-07 07:40:28 UTC (rev 3205)
@@ -11,8 +11,8 @@
bwh> http://patchwork.ozlabs.org/patch/293827/
Bugs:
upstream: released (3.13-rc3) [18fc25c94eadc52a42c025125af24657a93638c0]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: ignored "feature only marked as experimental"
sid: released (3.11.10-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
3.2-wheezy-security: released (3.2.53-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored "feature only marked as experimental"
3.2-upstream-stable:
Modified: active/CVE-2013-4483
===================================================================
--- active/CVE-2013-4483 2014-01-07 07:04:12 UTC (rev 3204)
+++ active/CVE-2013-4483 2014-01-07 07:40:28 UTC (rev 3205)
@@ -5,8 +5,8 @@
jmm> not affected, but the code seems to be present in all older kernels?
Bugs:
upstream: released (3.10) [6062a8dc0517bce23e3c2f7d2fea5e22411269a3]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: ignored "too intrusive to backport"
sid: released (3.10-1)
3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored "too intrusive to backport"
3.2-upstream-stable:
More information about the kernel-sec-discuss
mailing list