[kernel-sec-discuss] r3167 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Thu Dec 5 07:52:21 UTC 2013


Author: jmm
Date: 2013-12-05 07:51:16 +0000 (Thu, 05 Dec 2013)
New Revision: 3167

Modified:
   active/CVE-2012-2372
   active/CVE-2013-2929
   active/CVE-2013-4563
   active/CVE-2013-6282
   active/CVE-2013-6378
   active/CVE-2013-6380
   active/CVE-2013-6381
   active/CVE-2013-6382
Log:
3.10.10-1 released


Modified: active/CVE-2012-2372
===================================================================
--- active/CVE-2012-2372	2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2012-2372	2013-12-05 07:51:16 UTC (rev 3167)
@@ -10,9 +10,9 @@
  bwh> Real fix seems to be:
  bwh> http://patchwork.ozlabs.org/patch/293827/
 Bugs:
-upstream: needed "no upstream fix as of 2013.11.21"
+upstream: needed
 2.6.32-upstream-stable:
-sid: pending (3.11.10-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
-3.2-wheezy-security: ignored (3.2.41-2+deb7u1) "no upstream fix as of 2013.11.21"
-2.6.32-squeeze-security: ignored (2.6.32-48squeeze2) "no upstream fix as of 2013.11.21"
+sid: released (3.11.10-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
+3.2-wheezy-security: 
+2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-2929
===================================================================
--- active/CVE-2013-2929	2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-2929	2013-12-05 07:51:16 UTC (rev 3167)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.13-rc1) [d049f74f2dbe71354d43d393ac3a188947811348]
 2.6.32-upstream-stable: needed
-sid: pending (3.11.10-1)
+sid: released (3.11.10-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-4563
===================================================================
--- active/CVE-2013-4563	2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-4563	2013-12-05 07:51:16 UTC (rev 3167)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.13-rc1) [0e033e04c2678dbbe74a46b23fffb7bb918c288e]
 2.6.32-upstream-stable: N/A "Introduced in 3.10 with 1e2bd517c108816220f262d7954b697af03b5f9c"
-sid: pending (3.11.10-1) [bugfix/all/ipv6-fix-headroom-calculation-in-udp6_ufo_fragment.patch]
+sid: released (3.11.10-1) [bugfix/all/ipv6-fix-headroom-calculation-in-udp6_ufo_fragment.patch]
 3.2-wheezy-security: N/A "Introduced in 3.10 with 1e2bd517c108816220f262d7954b697af03b5f9c"
 2.6.32-squeeze-security: N/A "Introduced in 3.10 with 1e2bd517c108816220f262d7954b697af03b5f9c"
 3.2-upstream-stable: N/A "Introduced in 3.10 with 1e2bd517c108816220f262d7954b697af03b5f9c"

Modified: active/CVE-2013-6282
===================================================================
--- active/CVE-2013-6282	2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-6282	2013-12-05 07:51:16 UTC (rev 3167)
@@ -3,7 +3,7 @@
  https://www.codeaurora.org/projects/security-advisories/missing-access-checks-putusergetuser-kernel-api-cve-2013-6282
 Notes:
 Bugs:
-upstream:
+upstream: released (3.6) [8404663f81d212918ff85f493649a7991209fa04]
 2.6.32-upstream-stable:
 sid: released (3.6.4-1~experimental.1)
 3.2-wheezy-security:

Modified: active/CVE-2013-6378
===================================================================
--- active/CVE-2013-6378	2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-6378	2013-12-05 07:51:16 UTC (rev 3167)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.13-rc1) [a497e47d4aec37aaf8f13509f3ef3d1f6a717d88]
 2.6.32-upstream-stable: needed
-sid: pending (3.11.10-1)
+sid: released (3.11.10-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-6380
===================================================================
--- active/CVE-2013-6380	2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-6380	2013-12-05 07:51:16 UTC (rev 3167)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.13-rc1) [b4789b8e6be3151a955ade74872822f30e8cd914]
 2.6.32-upstream-stable: needed
-sid: pending (3.11.10-1)
+sid: released (3.11.10-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-6381
===================================================================
--- active/CVE-2013-6381	2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-6381	2013-12-05 07:51:16 UTC (rev 3167)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.13-rc1) [6fb392b1a63ae36c31f62bc3fc8630b49d602b62]
 2.6.32-upstream-stable: needed
-sid: pending (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
+sid: released (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-6382
===================================================================
--- active/CVE-2013-6382	2013-12-02 09:17:28 UTC (rev 3166)
+++ active/CVE-2013-6382	2013-12-05 07:51:16 UTC (rev 3167)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: needed
 2.6.32-upstream-stable: needed
-sid: pending (3.11.10-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
+sid: released (3.11.10-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list