[kernel-sec-discuss] r3412 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Mon Jun 30 04:23:49 UTC 2014
Author: jmm
Date: 2014-06-30 04:23:49 +0000 (Mon, 30 Jun 2014)
New Revision: 3412
Modified:
active/CVE-2014-1739
active/CVE-2014-3917
active/CVE-2014-3940
active/CVE-2014-4027
active/CVE-2014-4157
active/CVE-2014-4508
active/CVE-2014-4652
active/CVE-2014-4653
active/CVE-2014-4654
active/CVE-2014-4655
active/CVE-2014-4656
Log:
record wheezy upload
Modified: active/CVE-2014-1739
===================================================================
--- active/CVE-2014-1739 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-1739 2014-06-30 04:23:49 UTC (rev 3412)
@@ -6,6 +6,6 @@
upstream: released (3.15-rc6) [e6a623460e5fc960ac3ee9f946d3106233fd28d8]
2.6.32-upstream-stable: N/A "Affected code introduced in 2.6.38"
sid: released (3.14.7-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security: N/A "Affected code introduced in 2.6.38"
3.2-upstream-stable: released (3.2.60)
Modified: active/CVE-2014-3917
===================================================================
--- active/CVE-2014-3917 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-3917 2014-06-30 04:23:49 UTC (rev 3412)
@@ -6,6 +6,6 @@
upstream: released (3.15) [a3c54931199565930d6d84f4c3456f6440aefd41]
2.6.32-upstream-stable: pending (2.6.32.63)
sid: released (3.14.7-1) [bugfix/all/auditsc-audit_krule-mask-accesses-need-bounds-checki.patch]
-3.2-wheezy-security:
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security:
3.2-upstream-stable:
Modified: active/CVE-2014-3940
===================================================================
--- active/CVE-2014-3940 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-3940 2014-06-30 04:23:49 UTC (rev 3412)
@@ -5,6 +5,6 @@
upstream: released (3.15-rc8) [d4c54919ed86302094c0ca7d48a8cbd4ee753e92]
2.6.32-upstream-stable:
sid: released (3.14.7-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security:
3.2-upstream-stable: needed
Modified: active/CVE-2014-4027
===================================================================
--- active/CVE-2014-4027 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-4027 2014-06-30 04:23:49 UTC (rev 3412)
@@ -6,6 +6,6 @@
upstream: released (3.14) [4442dc8a92b8f9ad8ee9e7f8438f4c04c03a22dc]
2.6.32-upstream-stable: N/A "Introduced in 2.6.38"
sid: released (3.14.2-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security: N/A "Introduced in 2.6.38"
3.2-upstream-stable: needed
Modified: active/CVE-2014-4157
===================================================================
--- active/CVE-2014-4157 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-4157 2014-06-30 04:23:49 UTC (rev 3412)
@@ -6,6 +6,6 @@
upstream: released (3.15-rc1) [137f7df8cead00688524c82360930845396b8a21]
2.6.32-upstream-stable: needed
sid: released (3.14.7-1) [bugfix/mips/MIPS-asm-thread_info-Add-_TIF_SECCOMP-flag.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security: N/A "LTS only covers x86"
3.2-upstream-stable: needed
Modified: active/CVE-2014-4508
===================================================================
--- active/CVE-2014-4508 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-4508 2014-06-30 04:23:49 UTC (rev 3412)
@@ -6,6 +6,6 @@
upstream: needed
2.6.32-upstream-stable:
sid:
-3.2-wheezy-security:
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security:
3.2-upstream-stable:
Modified: active/CVE-2014-4652
===================================================================
--- active/CVE-2014-4652 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-4652 2014-06-30 04:23:49 UTC (rev 3412)
@@ -5,6 +5,6 @@
upstream: released (3.16-rc2) [07f4d9d74a04aa7c72c5dae0ef97565f28f17b92]
2.6.32-upstream-stable:
sid: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security: ignored "little impact"
3.2-upstream-stable: needed
Modified: active/CVE-2014-4653
===================================================================
--- active/CVE-2014-4653 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-4653 2014-06-30 04:23:49 UTC (rev 3412)
@@ -5,6 +5,6 @@
upstream: released (3.16-rc2) [fd9f26e4eca5d08a27d12c0933fceef76ed9663d]
2.6.32-upstream-stable: needed
sid: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2014-4654
===================================================================
--- active/CVE-2014-4654 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-4654 2014-06-30 04:23:49 UTC (rev 3412)
@@ -5,6 +5,6 @@
upstream: released (3.16-rc2) [82262a46627bebb0febcc26664746c25cef08563]
2.6.32-upstream-stable: needed
sid: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2014-4655
===================================================================
--- active/CVE-2014-4655 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-4655 2014-06-30 04:23:49 UTC (rev 3412)
@@ -5,6 +5,6 @@
upstream: released (3.16-rc2) [82262a46627bebb0febcc26664746c25cef08563]
2.6.32-upstream-stable: needed
sid: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2014-4656
===================================================================
--- active/CVE-2014-4656 2014-06-30 04:12:57 UTC (rev 3411)
+++ active/CVE-2014-4656 2014-06-30 04:23:49 UTC (rev 3412)
@@ -5,6 +5,6 @@
upstream: released (3.16-rc2) [883a1d49f0d77d30012f114b2e19fc141beb3e8e, ac902c112d90a89e59916f751c2745f4dbdbb4bd]
2.6.32-upstream-stable: needed
sid: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: released (3.2.60-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list