[kernel-sec-discuss] r3259 - active

Ben Hutchings benh at moszumanska.debian.org
Sat Mar 15 18:21:42 UTC 2014


Author: benh
Date: 2014-03-15 18:20:38 +0000 (Sat, 15 Mar 2014)
New Revision: 3259

Modified:
   active/CVE-2014-0100
   active/CVE-2014-0101
   active/CVE-2014-0102
   active/CVE-2014-0131
   active/CVE-2014-2309
Log:
Mark various issues pending in sid (3.13.6-1) with cherry-picked patches

Modified: active/CVE-2014-0100
===================================================================
--- active/CVE-2014-0100	2014-03-15 17:14:29 UTC (rev 3258)
+++ active/CVE-2014-0100	2014-03-15 18:20:38 UTC (rev 3259)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.14-rc5) [24b9bf43e93e0edd89072da51cf1fab95fc69dec]
 2.6.32-upstream-stable: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
-sid: needed
+sid: pending (3.13.6-1) [bugfix/all/net-fix-for-a-race-condition-in-the-inet-frag-code.patch]
 3.2-wheezy-security: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
 2.6.32-squeeze-security: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
 3.2-upstream-stable: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"

Modified: active/CVE-2014-0101
===================================================================
--- active/CVE-2014-0101	2014-03-15 17:14:29 UTC (rev 3258)
+++ active/CVE-2014-0101	2014-03-15 18:20:38 UTC (rev 3259)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.14-rc3) [ec0223ec48a90cb605244b45f7c62de856403729]
 2.6.32-upstream-stable: needed
-sid: needed
+sid: pending (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2014-0102
===================================================================
--- active/CVE-2014-0102	2014-03-15 17:14:29 UTC (rev 3258)
+++ active/CVE-2014-0102	2014-03-15 18:20:38 UTC (rev 3259)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (3.14-rc5) [979e0d74651ba5aa533277f2a6423d0f982fb6f6]
 2.6.32-upstream-stable: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"
-sid: needed
+sid: pending (3.13.6-1) [bugfix/all/KEYS-Make-the-keyring-cycle-detector-ignore-other-ke.patch]
 3.2-wheezy-security: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"
 2.6.32-squeeze-security: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"
 3.2-upstream-stable: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"

Modified: active/CVE-2014-0131
===================================================================
--- active/CVE-2014-0131	2014-03-15 17:14:29 UTC (rev 3258)
+++ active/CVE-2014-0131	2014-03-15 18:20:38 UTC (rev 3259)
@@ -3,9 +3,9 @@
  http://marc.info/?l=linux-netdev&m=139446896921968&w=2
 Notes:
 Bugs:
-upstream:
+upstream: pending (3.14-rc7) [8cb19905e9287a93ce7c2cbbdf742a060b00e219, 4e1beba12d094c6c761ba5c49032b9b9e46380e8, df5771ffefb13f8af5392bd54fd7e2b596a3a357, 1a4cedaf65491e66e1e55b8428c89209da729209, 1fd819ecb90cc9b822cd84d3056ddba315d3340f]
 2.6.32-upstream-stable:
-sid:
+sid: pending (3.13.6-1) [bugfix/all/0001-skbuff-skb_segment-s-frag-nskb_frag.patch, bugfix/all/0002-skbuff-skb_segment-s-skb_frag-frag.patch, bugfix/all/0003-skbuff-skb_segment-s-skb-head_skb.patch, bugfix/all/0004-skbuff-skb_segment-s-fskb-list_skb.patch, bugfix/all/0005-skbuff-skb_segment-orphan-frags-before-copying.patch]
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2014-2309
===================================================================
--- active/CVE-2014-2309	2014-03-15 17:14:29 UTC (rev 3258)
+++ active/CVE-2014-2309	2014-03-15 18:20:38 UTC (rev 3259)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.14-rc4) [c88507fbad8055297c1d1e21e599f46960cbee39]
 2.6.32-upstream-stable: N/A "Introduced in 3.0 with 957c665f37007de93ccbe45902a23143724170d0"
-sid: needed
+sid: pending (3.13.6-1) [bugfix/all/ipv6-don-t-set-DST_NOCOUNT-for-remotely-added-routes.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: N/A "Introduced in 3.0 with 957c665f37007de93ccbe45902a23143724170d0"
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list