[kernel-sec-discuss] r3392 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Jun 16 12:13:59 UTC 2014


Author: jmm
Date: 2014-06-16 12:13:59 +0000 (Mon, 16 Jun 2014)
New Revision: 3392

Modified:
   active/CVE-2014-0131
   active/CVE-2014-1739
   active/CVE-2014-2678
   active/CVE-2014-3917
   active/CVE-2014-3940
   active/CVE-2014-4014
Log:
fixes in sid


Modified: active/CVE-2014-0131
===================================================================
--- active/CVE-2014-0131	2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-0131	2014-06-16 12:13:59 UTC (rev 3392)
@@ -8,4 +8,4 @@
 sid: released (3.13.6-1) [bugfix/all/net-use-kfree_skb_list-helper.patch, bugfix/all/0001-skbuff-skb_segment-s-frag-nskb_frag.patch, bugfix/all/0002-skbuff-skb_segment-s-skb_frag-frag.patch, bugfix/all/0003-skbuff-skb_segment-s-skb-head_skb.patch, bugfix/all/0004-skbuff-skb_segment-s-fskb-list_skb.patch, bugfix/all/0005-skbuff-skb_segment-orphan-frags-before-copying.patch]
 3.2-wheezy-security: released (3.2.57-1) [bugfix/all/skbuff-skb_segment-orphan-frags-before-copying.patch]
 2.6.32-squeeze-security: N/A "zerocopy introduced in 3.1"
-3.2-upstream-stable:
+3.2-upstream-stable: needed

Modified: active/CVE-2014-1739
===================================================================
--- active/CVE-2014-1739	2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-1739	2014-06-16 12:13:59 UTC (rev 3392)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.15-rc6) [e6a623460e5fc960ac3ee9f946d3106233fd28d8]
 2.6.32-upstream-stable: N/A "Affected code introduced in 2.6.38"
-sid: needed
+sid: released (3.14.7-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: N/A "Affected code introduced in 2.6.38"
 3.2-upstream-stable: released (3.2.60)

Modified: active/CVE-2014-2678
===================================================================
--- active/CVE-2014-2678	2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-2678	2014-06-16 12:13:59 UTC (rev 3392)
@@ -1,4 +1,4 @@
-Description:  rds: prevent dereference of a NULL device in rds_iw_laddr_check
+Description: rds: prevent dereference of a NULL device in rds_iw_laddr_check
 References:
  https://lkml.org/lkml/2014/3/29/188
 Notes:

Modified: active/CVE-2014-3917
===================================================================
--- active/CVE-2014-3917	2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-3917	2014-06-16 12:13:59 UTC (rev 3392)
@@ -5,7 +5,7 @@
 Bugs: 
 upstream: released (3.15) [a3c54931199565930d6d84f4c3456f6440aefd41]
 2.6.32-upstream-stable: pending (2.6.32.63)
-sid: needed
+sid: released (3.14.7-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2014-3940
===================================================================
--- active/CVE-2014-3940	2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-3940	2014-06-16 12:13:59 UTC (rev 3392)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.15-rc8) [d4c54919ed86302094c0ca7d48a8cbd4ee753e92]
 2.6.32-upstream-stable: 
-sid: needed
+sid: released (3.14.7-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security:
 3.2-upstream-stable: needed

Modified: active/CVE-2014-4014
===================================================================
--- active/CVE-2014-4014	2014-06-16 07:50:19 UTC (rev 3391)
+++ active/CVE-2014-4014	2014-06-16 12:13:59 UTC (rev 3392)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: pending [23adbe12ef7d3d4195e80800ab36b37bee28cd03]
 2.6.32-upstream-stable:
-sid:
+sid: released (3.14.7-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:




More information about the kernel-sec-discuss mailing list