[kernel-sec-discuss] r3261 - active
Ben Hutchings
benh at moszumanska.debian.org
Thu Mar 20 01:50:44 UTC 2014
Author: benh
Date: 2014-03-20 01:49:40 +0000 (Thu, 20 Mar 2014)
New Revision: 3261
Modified:
active/CVE-2014-0049
active/CVE-2014-0069
active/CVE-2014-0100
active/CVE-2014-0101
active/CVE-2014-0102
active/CVE-2014-0131
active/CVE-2014-2309
Log:
Update for release of 3.13.6-1
Modified: active/CVE-2014-0049
===================================================================
--- active/CVE-2014-0049 2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0049 2014-03-20 01:49:40 UTC (rev 3261)
@@ -4,7 +4,7 @@
Bugs:
upstream: released (3.14-rc5) [a08d3b3b99efd509133946056531cdf8f3a0c09b]
2.6.32-upstream-stable: N/A "Introduced in 3.5 with f78146b0f"
-sid: pending (3.13.6-1)
+sid: released (3.13.6-1)
3.2-wheezy-security: N/A "Introduced in 3.5 with f78146b0f"
2.6.32-squeeze-security: N/A "Introduced in 3.5 with f78146b0f"
3.2-upstream-stable: N/A "Introduced in 3.5 with f78146b0f"
Modified: active/CVE-2014-0069
===================================================================
--- active/CVE-2014-0069 2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0069 2014-03-20 01:49:40 UTC (rev 3261)
@@ -5,7 +5,7 @@
Bugs:
upstream: released (3.14-rc4) [351a7934c0e788262f83380188f18e575f6bc63f]
2.6.32-upstream-stable: N/A "Only affects 2.6.38 and later"
-sid: pending (3.13.6-1)
+sid: released (3.13.6-1)
3.2-wheezy-security:
2.6.32-squeeze-security: N/A "Only affects 2.6.38 and later"
3.2-upstream-stable:
Modified: active/CVE-2014-0100
===================================================================
--- active/CVE-2014-0100 2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0100 2014-03-20 01:49:40 UTC (rev 3261)
@@ -5,7 +5,7 @@
Bugs:
upstream: released (3.14-rc5) [24b9bf43e93e0edd89072da51cf1fab95fc69dec]
2.6.32-upstream-stable: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
-sid: pending (3.13.6-1) [bugfix/all/net-fix-for-a-race-condition-in-the-inet-frag-code.patch]
+sid: released (3.13.6-1) [bugfix/all/net-fix-for-a-race-condition-in-the-inet-frag-code.patch]
3.2-wheezy-security: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
2.6.32-squeeze-security: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
3.2-upstream-stable: N/A "Introduced in 3.9 with 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206"
Modified: active/CVE-2014-0101
===================================================================
--- active/CVE-2014-0101 2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0101 2014-03-20 01:49:40 UTC (rev 3261)
@@ -5,7 +5,7 @@
Bugs:
upstream: released (3.14-rc3) [ec0223ec48a90cb605244b45f7c62de856403729]
2.6.32-upstream-stable: needed
-sid: pending (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
+sid: released (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
3.2-wheezy-security: needed
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2014-0102
===================================================================
--- active/CVE-2014-0102 2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0102 2014-03-20 01:49:40 UTC (rev 3261)
@@ -6,7 +6,7 @@
Bugs:
upstream: released (3.14-rc5) [979e0d74651ba5aa533277f2a6423d0f982fb6f6]
2.6.32-upstream-stable: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"
-sid: pending (3.13.6-1) [bugfix/all/KEYS-Make-the-keyring-cycle-detector-ignore-other-ke.patch]
+sid: released (3.13.6-1) [bugfix/all/KEYS-Make-the-keyring-cycle-detector-ignore-other-ke.patch]
3.2-wheezy-security: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"
2.6.32-squeeze-security: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"
3.2-upstream-stable: N/A "Introduced in 3.13 with b2a4df200d570b2c33a57e1ebfa5896e4bc81b69"
Modified: active/CVE-2014-0131
===================================================================
--- active/CVE-2014-0131 2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-0131 2014-03-20 01:49:40 UTC (rev 3261)
@@ -5,7 +5,7 @@
Bugs:
upstream: pending (3.14-rc7) [8cb19905e9287a93ce7c2cbbdf742a060b00e219, 4e1beba12d094c6c761ba5c49032b9b9e46380e8, df5771ffefb13f8af5392bd54fd7e2b596a3a357, 1a4cedaf65491e66e1e55b8428c89209da729209, 1fd819ecb90cc9b822cd84d3056ddba315d3340f]
2.6.32-upstream-stable:
-sid: pending (3.13.6-1) [bugfix/all/0001-skbuff-skb_segment-s-frag-nskb_frag.patch, bugfix/all/0002-skbuff-skb_segment-s-skb_frag-frag.patch, bugfix/all/0003-skbuff-skb_segment-s-skb-head_skb.patch, bugfix/all/0004-skbuff-skb_segment-s-fskb-list_skb.patch, bugfix/all/0005-skbuff-skb_segment-orphan-frags-before-copying.patch]
+sid: released (3.13.6-1) [bugfix/all/net-use-kfree_skb_list-helper.patch, bugfix/all/0001-skbuff-skb_segment-s-frag-nskb_frag.patch, bugfix/all/0002-skbuff-skb_segment-s-skb_frag-frag.patch, bugfix/all/0003-skbuff-skb_segment-s-skb-head_skb.patch, bugfix/all/0004-skbuff-skb_segment-s-fskb-list_skb.patch, bugfix/all/0005-skbuff-skb_segment-orphan-frags-before-copying.patch]
3.2-wheezy-security:
2.6.32-squeeze-security:
3.2-upstream-stable:
Modified: active/CVE-2014-2309
===================================================================
--- active/CVE-2014-2309 2014-03-18 06:25:05 UTC (rev 3260)
+++ active/CVE-2014-2309 2014-03-20 01:49:40 UTC (rev 3261)
@@ -5,7 +5,7 @@
Bugs:
upstream: released (3.14-rc4) [c88507fbad8055297c1d1e21e599f46960cbee39]
2.6.32-upstream-stable: N/A "Introduced in 3.0 with 957c665f37007de93ccbe45902a23143724170d0"
-sid: pending (3.13.6-1) [bugfix/all/ipv6-don-t-set-DST_NOCOUNT-for-remotely-added-routes.patch]
+sid: released (3.13.6-1) [bugfix/all/ipv6-don-t-set-DST_NOCOUNT-for-remotely-added-routes.patch]
3.2-wheezy-security: needed
2.6.32-squeeze-security: N/A "Introduced in 3.0 with 957c665f37007de93ccbe45902a23143724170d0"
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list