[kernel-sec-discuss] r3205 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Tue Jan 7 07:41:31 UTC 2014


Author: jmm
Date: 2014-01-07 07:40:28 +0000 (Tue, 07 Jan 2014)
New Revision: 3205

Modified:
   active/CVE-2012-2372
   active/CVE-2013-4483
Log:
ignore two issues for 2.6.32.x


Modified: active/CVE-2012-2372
===================================================================
--- active/CVE-2012-2372	2014-01-07 07:04:12 UTC (rev 3204)
+++ active/CVE-2012-2372	2014-01-07 07:40:28 UTC (rev 3205)
@@ -11,8 +11,8 @@
  bwh> http://patchwork.ozlabs.org/patch/293827/
 Bugs:
 upstream: released (3.13-rc3) [18fc25c94eadc52a42c025125af24657a93638c0]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: ignored "feature only marked as experimental"
 sid: released (3.11.10-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored "feature only marked as experimental"
 3.2-upstream-stable:

Modified: active/CVE-2013-4483
===================================================================
--- active/CVE-2013-4483	2014-01-07 07:04:12 UTC (rev 3204)
+++ active/CVE-2013-4483	2014-01-07 07:40:28 UTC (rev 3205)
@@ -5,8 +5,8 @@
  jmm> not affected, but the code seems to be present in all older kernels?
 Bugs:
 upstream: released (3.10) [6062a8dc0517bce23e3c2f7d2fea5e22411269a3]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: ignored "too intrusive to backport"
 sid: released (3.10-1)
 3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored "too intrusive to backport"
 3.2-upstream-stable:




More information about the kernel-sec-discuss mailing list