[kernel-sec-discuss] r3335 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Fri May 2 07:12:17 UTC 2014


Author: jmm
Date: 2014-05-02 07:12:17 +0000 (Fri, 02 May 2014)
New Revision: 3335

Modified:
   active/CVE-2014-0055
   active/CVE-2014-0077
   active/CVE-2014-2309
   active/CVE-2014-2678
Log:
mark 3.2.58 as released


Modified: active/CVE-2014-0055
===================================================================
--- active/CVE-2014-0055	2014-04-29 15:02:58 UTC (rev 3334)
+++ active/CVE-2014-0055	2014-05-02 07:12:17 UTC (rev 3335)
@@ -9,4 +9,4 @@
 sid: released (3.13.10-1) [bugfix/all/vhost-validate-vhost_get_vq_desc-return-value.patch]
 3.2-wheezy-security: released (3.2.57-1) [bugfix/all/vhost-validate-vhost_get_vq_desc-return-value.patch]
 2.6.32-squeeze-security: N/A "vhost_net introduced in 2.6.33"
-3.2-upstream-stable: pending (3.2.58) [vhost-validate-vhost_get_vq_desc-return-value.patch]
+3.2-upstream-stable: released (3.2.58) [vhost-validate-vhost_get_vq_desc-return-value.patch]

Modified: active/CVE-2014-0077
===================================================================
--- active/CVE-2014-0077	2014-04-29 15:02:58 UTC (rev 3334)
+++ active/CVE-2014-0077	2014-05-02 07:12:17 UTC (rev 3335)
@@ -8,4 +8,4 @@
 sid: released (3.13.10-1) [bugfix/all/vhost-fix-total-length-when-packets-are-too-short.patch]
 3.2-wheezy-security: released (3.2.57-1) [bugfix/all/vhost-fix-total-length-when-packets-are-too-short.patch]
 2.6.32-squeeze-security: N/A "vhost_net introduced in 2.6.33"
-3.2-upstream-stable: pending (3.2.58) [vhost-fix-total-length-when-packets-are-too-short.patch]
+3.2-upstream-stable: released (3.2.58) [vhost-fix-total-length-when-packets-are-too-short.patch]

Modified: active/CVE-2014-2309
===================================================================
--- active/CVE-2014-2309	2014-04-29 15:02:58 UTC (rev 3334)
+++ active/CVE-2014-2309	2014-05-02 07:12:17 UTC (rev 3335)
@@ -8,4 +8,4 @@
 sid: released (3.13.6-1) [bugfix/all/ipv6-don-t-set-DST_NOCOUNT-for-remotely-added-routes.patch]
 3.2-wheezy-security: released (3.2.57-1) [bugfix/all/ipv6-don-t-set-dst_nocount-for-remotely-added-routes.patch]
 2.6.32-squeeze-security: N/A "Introduced in 3.0 with 957c665f37007de93ccbe45902a23143724170d0"
-3.2-upstream-stable: pending (3.2.58) [ipv6-don-t-set-dst_nocount-for-remotely-added-routes.patch]
+3.2-upstream-stable: released (3.2.58) [ipv6-don-t-set-dst_nocount-for-remotely-added-routes.patch]

Modified: active/CVE-2014-2678
===================================================================
--- active/CVE-2014-2678	2014-04-29 15:02:58 UTC (rev 3334)
+++ active/CVE-2014-2678	2014-05-02 07:12:17 UTC (rev 3335)
@@ -8,4 +8,4 @@
 sid: released (3.13.10-1)
 3.2-wheezy-security: released (3.2.57-1) [bugfix/all/rds-prevent-dereference-of-a-null-device-in-rds_iw_laddr_check.patch]
 2.6.32-squeeze-security:
-3.2-upstream-stable: pending (3.2.58) [rds-prevent-dereference-of-a-null-device-in-rds_iw_laddr_check.patch]
+3.2-upstream-stable: released (3.2.58) [rds-prevent-dereference-of-a-null-device-in-rds_iw_laddr_check.patch]




More information about the kernel-sec-discuss mailing list