[kernel-sec-discuss] r3167 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Thu Dec 5 07:52:21 UTC 2013
Author: jmm
Date: 2013-12-05 07:51:16 +0000 (Thu, 05 Dec 2013)
New Revision: 3167
Modified:
active/CVE-2012-2372
active/CVE-2013-2929
active/CVE-2013-4563
active/CVE-2013-6282
active/CVE-2013-6378
active/CVE-2013-6380
active/CVE-2013-6381
active/CVE-2013-6382
Log:
3.10.10-1 released
Modified: active/CVE-2012-2372
===================================================================
--- active/CVE-2012-2372 2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2012-2372 2013-12-05 07:51:16 UTC (rev 3167)
@@ -10,9 +10,9 @@
bwh> Real fix seems to be:
bwh> http://patchwork.ozlabs.org/patch/293827/
Bugs:
-upstream: needed "no upstream fix as of 2013.11.21"
+upstream: needed
2.6.32-upstream-stable:
-sid: pending (3.11.10-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
-3.2-wheezy-security: ignored (3.2.41-2+deb7u1) "no upstream fix as of 2013.11.21"
-2.6.32-squeeze-security: ignored (2.6.32-48squeeze2) "no upstream fix as of 2013.11.21"
+sid: released (3.11.10-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
+3.2-wheezy-security:
+2.6.32-squeeze-security:
3.2-upstream-stable:
Modified: active/CVE-2013-2929
===================================================================
--- active/CVE-2013-2929 2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-2929 2013-12-05 07:51:16 UTC (rev 3167)
@@ -4,7 +4,7 @@
Bugs:
upstream: released (3.13-rc1) [d049f74f2dbe71354d43d393ac3a188947811348]
2.6.32-upstream-stable: needed
-sid: pending (3.11.10-1)
+sid: released (3.11.10-1)
3.2-wheezy-security: needed
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-4563
===================================================================
--- active/CVE-2013-4563 2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-4563 2013-12-05 07:51:16 UTC (rev 3167)
@@ -4,7 +4,7 @@
Bugs:
upstream: released (3.13-rc1) [0e033e04c2678dbbe74a46b23fffb7bb918c288e]
2.6.32-upstream-stable: N/A "Introduced in 3.10 with 1e2bd517c108816220f262d7954b697af03b5f9c"
-sid: pending (3.11.10-1) [bugfix/all/ipv6-fix-headroom-calculation-in-udp6_ufo_fragment.patch]
+sid: released (3.11.10-1) [bugfix/all/ipv6-fix-headroom-calculation-in-udp6_ufo_fragment.patch]
3.2-wheezy-security: N/A "Introduced in 3.10 with 1e2bd517c108816220f262d7954b697af03b5f9c"
2.6.32-squeeze-security: N/A "Introduced in 3.10 with 1e2bd517c108816220f262d7954b697af03b5f9c"
3.2-upstream-stable: N/A "Introduced in 3.10 with 1e2bd517c108816220f262d7954b697af03b5f9c"
Modified: active/CVE-2013-6282
===================================================================
--- active/CVE-2013-6282 2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-6282 2013-12-05 07:51:16 UTC (rev 3167)
@@ -3,7 +3,7 @@
https://www.codeaurora.org/projects/security-advisories/missing-access-checks-putusergetuser-kernel-api-cve-2013-6282
Notes:
Bugs:
-upstream:
+upstream: released (3.6) [8404663f81d212918ff85f493649a7991209fa04]
2.6.32-upstream-stable:
sid: released (3.6.4-1~experimental.1)
3.2-wheezy-security:
Modified: active/CVE-2013-6378
===================================================================
--- active/CVE-2013-6378 2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-6378 2013-12-05 07:51:16 UTC (rev 3167)
@@ -5,7 +5,7 @@
Bugs:
upstream: released (3.13-rc1) [a497e47d4aec37aaf8f13509f3ef3d1f6a717d88]
2.6.32-upstream-stable: needed
-sid: pending (3.11.10-1)
+sid: released (3.11.10-1)
3.2-wheezy-security: needed
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-6380
===================================================================
--- active/CVE-2013-6380 2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-6380 2013-12-05 07:51:16 UTC (rev 3167)
@@ -4,7 +4,7 @@
Bugs:
upstream: released (3.13-rc1) [b4789b8e6be3151a955ade74872822f30e8cd914]
2.6.32-upstream-stable: needed
-sid: pending (3.11.10-1)
+sid: released (3.11.10-1)
3.2-wheezy-security: needed
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-6381
===================================================================
--- active/CVE-2013-6381 2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-6381 2013-12-05 07:51:16 UTC (rev 3167)
@@ -4,7 +4,7 @@
Bugs:
upstream: released (3.13-rc1) [6fb392b1a63ae36c31f62bc3fc8630b49d602b62]
2.6.32-upstream-stable: needed
-sid: pending (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
+sid: released (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
3.2-wheezy-security: needed
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-6382
===================================================================
--- active/CVE-2013-6382 2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-6382 2013-12-05 07:51:16 UTC (rev 3167)
@@ -5,7 +5,7 @@
Bugs:
upstream: needed
2.6.32-upstream-stable: needed
-sid: pending (3.11.10-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
+sid: released (3.11.10-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
3.2-wheezy-security: needed
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list