[kernel-sec-discuss] r3047 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Thu Aug 29 06:26:04 UTC 2013


Author: jmm
Date: 2013-08-29 06:25:41 +0000 (Thu, 29 Aug 2013)
New Revision: 3047

Modified:
   active/CVE-2013-1059
   active/CVE-2013-2148
   active/CVE-2013-2164
   active/CVE-2013-2232
   active/CVE-2013-2234
   active/CVE-2013-2237
   active/CVE-2013-2851
   active/CVE-2013-2852
   active/CVE-2013-4162
   active/CVE-2013-4163
Log:
fixes from DSA


Modified: active/CVE-2013-1059
===================================================================
--- active/CVE-2013-1059	2013-08-29 02:03:21 UTC (rev 3046)
+++ active/CVE-2013-1059	2013-08-29 06:25:41 UTC (rev 3047)
@@ -7,6 +7,6 @@
 upstream: released (3.11-rc1) [2cb33cac622afde897aa02d3dcd9fbba8bae839e]
 2.6.32-upstream-stable: N/A "ceph was introduced in 2.6.34"
 sid: released (3.10.1-1)
-3.2-wheezy-security: pending (3.2.46-1+deb7u1) [bugfix/all/libceph-Fix-NULL-pointer-dereference-in-auth-client-.patch]
+3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/libceph-Fix-NULL-pointer-dereference-in-auth-client-.patch]
 2.6.32-squeeze-security: N/A "ceph was introduced in 2.6.34"
 3.2-upstream-stable: released (3.2.49)
\ No newline at end of file

Modified: active/CVE-2013-2148
===================================================================
--- active/CVE-2013-2148	2013-08-29 02:03:21 UTC (rev 3046)
+++ active/CVE-2013-2148	2013-08-29 06:25:41 UTC (rev 3047)
@@ -6,6 +6,6 @@
 upstream: released (3.11-rc1) [de1e0c40aceb9d5bff09c3a3b97b2f1b178af53f]
 2.6.32-upstream-stable: N/A "fanotify introduced in 2.6.36"
 sid: released (3.9.8-1)
-3.2-wheezy-security: pending (3.2.46-1+deb7u1) [bugfix/all/fanotify-info-leak-in-copy_event_to_user.patch]
+3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/fanotify-info-leak-in-copy_event_to_user.patch]
 2.6.32-squeeze-security: N/A "fanotify introduced in 2.6.36"
 3.2-upstream-stable: released (3.2.50)

Modified: active/CVE-2013-2164
===================================================================
--- active/CVE-2013-2164	2013-08-29 02:03:21 UTC (rev 3046)
+++ active/CVE-2013-2164	2013-08-29 06:25:41 UTC (rev 3047)
@@ -7,6 +7,6 @@
 upstream: released (3.11-rc1) [542db01579fbb7ea7d1f7bb9ddcef1559df660b2]
 2.6.32-upstream-stable: needed
 sid: released (3.9.8-1)
-3.2-wheezy-security: pending (3.2.46-1+deb7u1) [bugfix/all/drivers-cdrom-cdrom.c-use-kzalloc-for-failing-hardwa.patch]
+3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/drivers-cdrom-cdrom.c-use-kzalloc-for-failing-hardwa.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: released (3.2.49)

Modified: active/CVE-2013-2232
===================================================================
--- active/CVE-2013-2232	2013-08-29 02:03:21 UTC (rev 3046)
+++ active/CVE-2013-2232	2013-08-29 06:25:41 UTC (rev 3047)
@@ -5,6 +5,6 @@
 upstream: released (3.10) [a963a37d384d71ad43b3e9e79d68d42fbe0901f3]
 2.6.32-upstream-stable:
 sid: released (3.10.1-1)
-3.2-wheezy-security: pending (3.2.46-1+deb7u1) [bugfix/all/ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch]
+3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch]
 2.6.32-squeeze-security:
 3.2-upstream-stable: released (3.2.50)

Modified: active/CVE-2013-2234
===================================================================
--- active/CVE-2013-2234	2013-08-29 02:03:21 UTC (rev 3046)
+++ active/CVE-2013-2234	2013-08-29 06:25:41 UTC (rev 3047)
@@ -5,6 +5,6 @@
 upstream: released (3.10) [a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887]
 2.6.32-upstream-stable: needed
 sid: released (3.10.1-1)
-3.2-wheezy-security: pending (3.2.46-1+deb7u1) [bugfix/all/af_key-fix-info-leaks-in-notify-messages.patch]
+3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/af_key-fix-info-leaks-in-notify-messages.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: released (3.2.50)

Modified: active/CVE-2013-2237
===================================================================
--- active/CVE-2013-2237	2013-08-29 02:03:21 UTC (rev 3046)
+++ active/CVE-2013-2237	2013-08-29 06:25:41 UTC (rev 3047)
@@ -5,6 +5,6 @@
 upstream: released (3.9) [85dfb745ee40232876663ae206cba35f24ab2a40]
 2.6.32-upstream-stable: needed
 sid: released (3.9.4-1)
-3.2-wheezy-security: pending (3.2.46-1+deb7u1) [bugfix/all/af_key-initialize-satype-in-key_notify_policy_flush.patch]
+3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/af_key-initialize-satype-in-key_notify_policy_flush.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-2851
===================================================================
--- active/CVE-2013-2851	2013-08-29 02:03:21 UTC (rev 3046)
+++ active/CVE-2013-2851	2013-08-29 06:25:41 UTC (rev 3047)
@@ -6,6 +6,6 @@
 upstream: released (3.11-rc1) [ffc8b30866879ed9ba62bd0a86fecdbd51cd3d19]
 2.6.32-upstream-stable: needed
 sid: released (3.9.8-1)
-3.2-wheezy-security: pending (3.2.46-1+deb7u1) [bugfix/all/block-do-not-pass-disk-names-as-format-strings.patch]
+3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/block-do-not-pass-disk-names-as-format-strings.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: released (3.2.49)

Modified: active/CVE-2013-2852
===================================================================
--- active/CVE-2013-2852	2013-08-29 02:03:21 UTC (rev 3046)
+++ active/CVE-2013-2852	2013-08-29 06:25:41 UTC (rev 3047)
@@ -5,6 +5,6 @@
 upstream: released (3.10-rc6) [e0e29b683d6784ef59bbc914eac85a04b650e63c]
 2.6.32-upstream-stable: needed
 sid: released (3.9.8-1)
-3.2-wheezy-security: pending (3.2.46-1+deb7u1) [bugfix/all/b43-stop-format-string-leaking-into-error-msgs.patch]
+3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/b43-stop-format-string-leaking-into-error-msgs.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: released (3.2.47)

Modified: active/CVE-2013-4162
===================================================================
--- active/CVE-2013-4162	2013-08-29 02:03:21 UTC (rev 3046)
+++ active/CVE-2013-4162	2013-08-29 06:25:41 UTC (rev 3047)
@@ -6,7 +6,7 @@
 upstream: released (3.11-rc1) [8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1]
 2.6.32-upstream-stable: needed
 sid: released (3.10.5-1)
-3.2-wheezy-security: pending (3.2.46-1+deb7u1) [bugfix/all/ipv6-call-udp_push_pending_frames-when-uncorking-a-s.patch]
+3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-call-udp_push_pending_frames-when-uncorking-a-s.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: released (3.2.50)
 

Modified: active/CVE-2013-4163
===================================================================
--- active/CVE-2013-4163	2013-08-29 02:03:21 UTC (rev 3046)
+++ active/CVE-2013-4163	2013-08-29 06:25:41 UTC (rev 3047)
@@ -8,6 +8,6 @@
 upstream: released (3.11-rc1) [75a493e60ac4bbe2e977e7129d6d8cbb0dd236be]
 2.6.32-upstream-stable: N/A "Introduced with 0c1833797a5a6ec23ea9261d979aa18078720b74"
 sid: released (3.10.5-1)
-3.2-wheezy-security: pending (3.2.46-1+deb7u1) [bugfix/all/ipv6-ip6_append_data_mtu-did-not-care-about-pmtudisc.patch]
+3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-ip6_append_data_mtu-did-not-care-about-pmtudisc.patch]
 2.6.32-squeeze-security: N/A "Introduced with 0c1833797a5a6ec23ea9261d979aa18078720b74"
 3.2-upstream-stable: released (3.2.50)




More information about the kernel-sec-discuss mailing list