[kernel-sec-discuss] r3392 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Mon Jun 16 12:13:59 UTC 2014
Author: jmm
Date: 2014-06-16 12:13:59 +0000 (Mon, 16 Jun 2014)
New Revision: 3392
Modified:
active/CVE-2014-0131
active/CVE-2014-1739
active/CVE-2014-2678
active/CVE-2014-3917
active/CVE-2014-3940
active/CVE-2014-4014
Log:
fixes in sid
Modified: active/CVE-2014-0131
===================================================================
--- active/CVE-2014-0131 2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-0131 2014-06-16 12:13:59 UTC (rev 3392)
@@ -8,4 +8,4 @@
sid: released (3.13.6-1) [bugfix/all/net-use-kfree_skb_list-helper.patch, bugfix/all/0001-skbuff-skb_segment-s-frag-nskb_frag.patch, bugfix/all/0002-skbuff-skb_segment-s-skb_frag-frag.patch, bugfix/all/0003-skbuff-skb_segment-s-skb-head_skb.patch, bugfix/all/0004-skbuff-skb_segment-s-fskb-list_skb.patch, bugfix/all/0005-skbuff-skb_segment-orphan-frags-before-copying.patch]
3.2-wheezy-security: released (3.2.57-1) [bugfix/all/skbuff-skb_segment-orphan-frags-before-copying.patch]
2.6.32-squeeze-security: N/A "zerocopy introduced in 3.1"
-3.2-upstream-stable:
+3.2-upstream-stable: needed
Modified: active/CVE-2014-1739
===================================================================
--- active/CVE-2014-1739 2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-1739 2014-06-16 12:13:59 UTC (rev 3392)
@@ -5,7 +5,7 @@
Bugs:
upstream: released (3.15-rc6) [e6a623460e5fc960ac3ee9f946d3106233fd28d8]
2.6.32-upstream-stable: N/A "Affected code introduced in 2.6.38"
-sid: needed
+sid: released (3.14.7-1)
3.2-wheezy-security: needed
2.6.32-squeeze-security: N/A "Affected code introduced in 2.6.38"
3.2-upstream-stable: released (3.2.60)
Modified: active/CVE-2014-2678
===================================================================
--- active/CVE-2014-2678 2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-2678 2014-06-16 12:13:59 UTC (rev 3392)
@@ -1,4 +1,4 @@
-Description: rds: prevent dereference of a NULL device in rds_iw_laddr_check
+Description: rds: prevent dereference of a NULL device in rds_iw_laddr_check
References:
https://lkml.org/lkml/2014/3/29/188
Notes:
Modified: active/CVE-2014-3917
===================================================================
--- active/CVE-2014-3917 2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-3917 2014-06-16 12:13:59 UTC (rev 3392)
@@ -5,7 +5,7 @@
Bugs:
upstream: released (3.15) [a3c54931199565930d6d84f4c3456f6440aefd41]
2.6.32-upstream-stable: pending (2.6.32.63)
-sid: needed
+sid: released (3.14.7-1)
3.2-wheezy-security:
2.6.32-squeeze-security:
3.2-upstream-stable:
Modified: active/CVE-2014-3940
===================================================================
--- active/CVE-2014-3940 2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-3940 2014-06-16 12:13:59 UTC (rev 3392)
@@ -4,7 +4,7 @@
Bugs:
upstream: released (3.15-rc8) [d4c54919ed86302094c0ca7d48a8cbd4ee753e92]
2.6.32-upstream-stable:
-sid: needed
+sid: released (3.14.7-1)
3.2-wheezy-security: needed
2.6.32-squeeze-security:
3.2-upstream-stable: needed
Modified: active/CVE-2014-4014
===================================================================
--- active/CVE-2014-4014 2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-4014 2014-06-16 12:13:59 UTC (rev 3392)
@@ -5,7 +5,7 @@
Bugs:
upstream: pending [23adbe12ef7d3d4195e80800ab36b37bee28cd03]
2.6.32-upstream-stable:
-sid:
+sid: released (3.14.7-1)
3.2-wheezy-security:
2.6.32-squeeze-security:
3.2-upstream-stable:
More information about the kernel-sec-discuss
mailing list