[kernel-sec-discuss] r3261 - active

Ben Hutchings benh at moszumanska.debian.org
Thu Mar 20 01:50:44 UTC 2014


Author: benh
Date: 2014-03-20 01:49:40 +0000 (Thu, 20 Mar 2014)
New Revision: 3261

Modified:
   active/CVE-2014-0049
   active/CVE-2014-0069
   active/CVE-2014-0100
   active/CVE-2014-0101
   active/CVE-2014-0102
   active/CVE-2014-0131
   active/CVE-2014-2309
Log:
Update for release of 3.13.6-1

Modified: active/CVE-2014-0049
===================================================================
--- active/CVE-2014-0049	2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0049	2014-03-20 01:49:40 UTC (rev 3261)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.14-rc5) [a08d3b3b99efd509133946056531cdf8f3a0c09b]
 2.6.32-upstream-stable: N/A "Introduced in 3.5 with f78146b0f"
-sid: pending (3.13.6-1)
+sid: released (3.13.6-1)
 3.2-wheezy-security: N/A "Introduced in 3.5 with f78146b0f"
 2.6.32-squeeze-security: N/A "Introduced in 3.5 with f78146b0f"
 3.2-upstream-stable: N/A "Introduced in 3.5 with f78146b0f"

Modified: active/CVE-2014-0069
===================================================================
--- active/CVE-2014-0069	2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0069	2014-03-20 01:49:40 UTC (rev 3261)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.14-rc4) [351a7934c0e788262f83380188f18e575f6bc63f]
 2.6.32-upstream-stable: N/A "Only affects 2.6.38 and later"
-sid: pending (3.13.6-1)
+sid: released (3.13.6-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: N/A "Only affects 2.6.38 and later"
 3.2-upstream-stable:

Modified: active/CVE-2014-0100
===================================================================
--- active/CVE-2014-0100	2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0100	2014-03-20 01:49:40 UTC (rev 3261)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.14-rc5) [24b9bf43e93e0edd89072da51cf1fab95fc69dec]
 2.6.32-upstream-stable: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
-sid: pending (3.13.6-1) [bugfix/all/net-fix-for-a-race-condition-in-the-inet-frag-code.patch]
+sid: released (3.13.6-1) [bugfix/all/net-fix-for-a-race-condition-in-the-inet-frag-code.patch]
 3.2-wheezy-security: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
 2.6.32-squeeze-security: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
 3.2-upstream-stable: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"

Modified: active/CVE-2014-0101
===================================================================
--- active/CVE-2014-0101	2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0101	2014-03-20 01:49:40 UTC (rev 3261)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.14-rc3) [ec0223ec48a90cb605244b45f7c62de856403729]
 2.6.32-upstream-stable: needed
-sid: pending (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
+sid: released (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2014-0102
===================================================================
--- active/CVE-2014-0102	2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0102	2014-03-20 01:49:40 UTC (rev 3261)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (3.14-rc5) [979e0d74651ba5aa533277f2a6423d0f982fb6f6]
 2.6.32-upstream-stable: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"
-sid: pending (3.13.6-1) [bugfix/all/KEYS-Make-the-keyring-cycle-detector-ignore-other-ke.patch]
+sid: released (3.13.6-1) [bugfix/all/KEYS-Make-the-keyring-cycle-detector-ignore-other-ke.patch]
 3.2-wheezy-security: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"
 2.6.32-squeeze-security: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"
 3.2-upstream-stable: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"

Modified: active/CVE-2014-0131
===================================================================
--- active/CVE-2014-0131	2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0131	2014-03-20 01:49:40 UTC (rev 3261)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: pending (3.14-rc7) [8cb19905e9287a93ce7c2cbbdf742a060b00e219, 4e1beba12d094c6c761ba5c49032b9b9e46380e8, df5771ffefb13f8af5392bd54fd7e2b596a3a357, 1a4cedaf65491e66e1e55b8428c89209da729209, 1fd819ecb90cc9b822cd84d3056ddba315d3340f]
 2.6.32-upstream-stable:
-sid: pending (3.13.6-1) [bugfix/all/0001-skbuff-skb_segment-s-frag-nskb_frag.patch, bugfix/all/0002-skbuff-skb_segment-s-skb_frag-frag.patch, bugfix/all/0003-skbuff-skb_segment-s-skb-head_skb.patch, bugfix/all/0004-skbuff-skb_segment-s-fskb-list_skb.patch, bugfix/all/0005-skbuff-skb_segment-orphan-frags-before-copying.patch]
+sid: released (3.13.6-1) [bugfix/all/net-use-kfree_skb_list-helper.patch, bugfix/all/0001-skbuff-skb_segment-s-frag-nskb_frag.patch, bugfix/all/0002-skbuff-skb_segment-s-skb_frag-frag.patch, bugfix/all/0003-skbuff-skb_segment-s-skb-head_skb.patch, bugfix/all/0004-skbuff-skb_segment-s-fskb-list_skb.patch, bugfix/all/0005-skbuff-skb_segment-orphan-frags-before-copying.patch]
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2014-2309
===================================================================
--- active/CVE-2014-2309	2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-2309	2014-03-20 01:49:40 UTC (rev 3261)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.14-rc4) [c88507fbad8055297c1d1e21e599f46960cbee39]
 2.6.32-upstream-stable: N/A "Introduced in 3.0 with 957c665f37007de93ccbe45902a23143724170d0"
-sid: pending (3.13.6-1) [bugfix/all/ipv6-don-t-set-DST_NOCOUNT-for-remotely-added-routes.patch]
+sid: released (3.13.6-1) [bugfix/all/ipv6-don-t-set-DST_NOCOUNT-for-remotely-added-routes.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: N/A "Introduced in 3.0 with 957c665f37007de93ccbe45902a23143724170d0"
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list