[kernel-sec-discuss] r3349 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed May 14 05:01:45 UTC 2014


Author: jmm
Date: 2014-05-14 04:59:49 +0000 (Wed, 14 May 2014)
New Revision: 3349

Modified:
   active/CVE-2014-0155
   active/CVE-2014-0196
   active/CVE-2014-1737
   active/CVE-2014-1738
   active/CVE-2014-2851
   active/CVE-2014-3122
   active/CVE-2014-3144
   active/CVE-2014-3145
Log:
sid upload


Modified: active/CVE-2014-0155
===================================================================
--- active/CVE-2014-0155	2014-05-13 15:45:09 UTC (rev 3348)
+++ active/CVE-2014-0155	2014-05-14 04:59:49 UTC (rev 3349)
@@ -3,9 +3,9 @@
  https://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=5678de3f15010b9022ee45673f33bcfc71d47b60
 Notes:
 Bugs:
-upstream: pending (3.15-rc2) [5678de3f15010b9022ee45673f33bcfc71d47b60]
+upstream: released (3.15-rc2) [5678de3f15010b9022ee45673f33bcfc71d47b60]
 2.6.32-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (3.14.4-1)
+sid: released (3.14.4-1)
 3.2-wheezy-security: N/A "Vulnerable code not present"
 2.6.32-squeeze-security: N/A "Vulnerable code not present"
 3.2-upstream-stable: N/A "Vulnerable code not present"

Modified: active/CVE-2014-0196
===================================================================
--- active/CVE-2014-0196	2014-05-13 15:45:09 UTC (rev 3348)
+++ active/CVE-2014-0196	2014-05-14 04:59:49 UTC (rev 3349)
@@ -3,8 +3,8 @@
 Notes:
 Bugs: 747166
 upstream: released (3.15-rc5) [4291086b1f081b869c6d79e5b7441633dc3ace00]
-2.6.32-upstream-stable:
-sid: pending (3.14.4-1)
+2.6.32-upstream-stable: pending
+sid: released (3.14.4-1)
 3.2-wheezy-security: released (3.2.57-3+deb7u1) [bugfix/all/n_tty-Fix-n_tty_write-crash-when-echoing-in-raw-mode.patch]
-2.6.32-squeeze-security:
-3.2-upstream-stable:
+2.6.32-squeeze-security: pending
+3.2-upstream-stable: needed

Modified: active/CVE-2014-1737
===================================================================
--- active/CVE-2014-1737	2014-05-13 15:45:09 UTC (rev 3348)
+++ active/CVE-2014-1737	2014-05-14 04:59:49 UTC (rev 3349)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.15-rc4) [ef87dbe7614341c2e7bfe8d32fcb7028cc97442c]
 2.6.32-upstream-stable: needed
-sid: pending (3.14.4-1)
+sid: released (3.14.4-1)
 3.2-wheezy-security: released (3.2.57-3+deb7u1) [bugfix/all/floppy-ignore-kernel-only-members-in-FDRAWCMD-ioctl-.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2014-1738
===================================================================
--- active/CVE-2014-1738	2014-05-13 15:45:09 UTC (rev 3348)
+++ active/CVE-2014-1738	2014-05-14 04:59:49 UTC (rev 3349)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.15-rc4) [2145e15e0557a01b9195d1c7199a1b92cb9be81f]
 2.6.32-upstream-stable: needed
-sid: pending (3.14.4-1)
+sid: released (3.14.4-1)
 3.2-wheezy-security: released (3.2.57-3+deb7u1) [bugfix/all/floppy-don-t-write-kernel-only-members-to-FDRAWCMD-i.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2014-2851
===================================================================
--- active/CVE-2014-2851	2014-05-13 15:45:09 UTC (rev 3348)
+++ active/CVE-2014-2851	2014-05-14 04:59:49 UTC (rev 3349)
@@ -8,7 +8,7 @@
 Bugs:
 upstream: released (3.15-rc2) [b04c46190219a4f845e46a459e3102137b7f6cac]
 2.6.32-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (3.14.4-1) [bugfix/all/net-ipv4-current-group_info-should-be-put-after-usin.patch]
+sid: released (3.14.4-1) [bugfix/all/net-ipv4-current-group_info-should-be-put-after-usin.patch]
 3.2-wheezy-security: released (3.2.57-3+deb7u1) [bugfix/all/net-ipv4-current-group_info-should-be-put-after-usin.patch]
 2.6.32-squeeze-security: N/A "Vulnerable code not present"
-3.2-upstream-stable:
+3.2-upstream-stable: needed

Modified: active/CVE-2014-3122
===================================================================
--- active/CVE-2014-3122	2014-05-13 15:45:09 UTC (rev 3348)
+++ active/CVE-2014-3122	2014-05-14 04:59:49 UTC (rev 3349)
@@ -4,7 +4,7 @@
 Bugs: 747326
 upstream: released (3.15-rc1) [57e68e9cd65b4b8eb4045a1e0d0746458502554c]
 2.6.32-upstream-stable: needed
-sid: pending (3.14.4-1)
+sid: released (3.14.4-1)
 3.2-wheezy-security: released (3.2.57-3+deb7u1) [bugfix/all/mm-try_to_unmap_cluster-should-lock_page-before-mloc.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: released (3.2.58)

Modified: active/CVE-2014-3144
===================================================================
--- active/CVE-2014-3144	2014-05-13 15:45:09 UTC (rev 3348)
+++ active/CVE-2014-3144	2014-05-14 04:59:49 UTC (rev 3349)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (v3.15-rc2) [05ab8f2647e4221cbdb3856dd7d32bd5407316b3]
 2.6.32-upstream-stable: needed
-sid: pending (3.14.4-1) [bugfix/all/filter-prevent-nla-extensions-to-peek-beyond-the-end.patch]
+sid: released (3.14.4-1) [bugfix/all/filter-prevent-nla-extensions-to-peek-beyond-the-end.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2014-3145
===================================================================
--- active/CVE-2014-3145	2014-05-13 15:45:09 UTC (rev 3348)
+++ active/CVE-2014-3145	2014-05-14 04:59:49 UTC (rev 3349)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (v3.15-rc2) [05ab8f2647e4221cbdb3856dd7d32bd5407316b3]
 2.6.32-upstream-stable: needed
-sid: pending (3.14.4-1) [bugfix/all/filter-prevent-nla-extensions-to-peek-beyond-the-end.patch]
+sid: released (3.14.4-1) [bugfix/all/filter-prevent-nla-extensions-to-peek-beyond-the-end.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list