[kernel-sec-discuss] r3170 - active

Ben Hutchings benh at moszumanska.debian.org
Fri Dec 6 06:28:51 UTC 2013


Author: benh
Date: 2013-12-06 06:27:47 +0000 (Fri, 06 Dec 2013)
New Revision: 3170

Modified:
   active/CVE-2012-2372
   active/CVE-2013-2897
   active/CVE-2013-2929
   active/CVE-2013-4345
   active/CVE-2013-4592
   active/CVE-2013-6282
   active/CVE-2013-6378
   active/CVE-2013-6380
   active/CVE-2013-6381
   active/CVE-2013-6382
Log:
Mark issues pending in 3.2.53-1 with cherry-picked patches

Modified: active/CVE-2012-2372
===================================================================
--- active/CVE-2012-2372	2013-12-06 04:00:52 UTC (rev 3169)
+++ active/CVE-2012-2372	2013-12-06 06:27:47 UTC (rev 3170)
@@ -13,6 +13,6 @@
 upstream: needed
 2.6.32-upstream-stable:
 sid: released (3.11.10-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
-3.2-wheezy-security: 
+3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-2897
===================================================================
--- active/CVE-2013-2897	2013-12-06 04:00:52 UTC (rev 3169)
+++ active/CVE-2013-2897	2013-12-06 06:27:47 UTC (rev 3170)
@@ -7,6 +7,6 @@
 upstream: released (3.12-rc2) [cc6b54aa54bf40b762cab45a9fc8aa81653146eb, 8821f5dc187bdf16cfb32ef5aa8c3035273fa79a]
 2.6.32-upstream-stable: N/A "Introduced in 2.6.38 with 5519cab477b61326963c8d523520db0342862b63"
 sid: released (3.11.5-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/HID-multitouch-validate-indexes-details.patch]
 2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 5519cab477b61326963c8d523520db0342862b63"
 3.2-upstream-stable: needed

Modified: active/CVE-2013-2929
===================================================================
--- active/CVE-2013-2929	2013-12-06 04:00:52 UTC (rev 3169)
+++ active/CVE-2013-2929	2013-12-06 06:27:47 UTC (rev 3170)
@@ -5,6 +5,6 @@
 upstream: released (3.13-rc1) [d049f74f2dbe71354d43d393ac3a188947811348]
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-4345
===================================================================
--- active/CVE-2013-4345	2013-12-06 04:00:52 UTC (rev 3169)
+++ active/CVE-2013-4345	2013-12-06 06:27:47 UTC (rev 3170)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc1) [714b33d15130cbb5ab426456d4e3de842d6c5b8a]
 2.6.32-upstream-stable: needed
 sid: released (3.11.5-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/crypto-ansi_cprng-Fix-off-by-one-error-in-non-block-.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-4592
===================================================================
--- active/CVE-2013-4592	2013-12-06 04:00:52 UTC (rev 3169)
+++ active/CVE-2013-4592	2013-12-06 06:27:47 UTC (rev 3170)
@@ -5,6 +5,6 @@
 upstream: released (3.8) [e40f193f5bb022e927a57a4f5d5194e4f12ddb74, 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8]
 2.6.32-upstream-stable:
 sid: released (3.8-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/KVM-perform-an-invalid-memslot-step-for-gpa-base-cha.patch, bugfix/all/KVM-Fix-iommu-map-unmap-to-handle-memory-slot-moves.patch]
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-6282
===================================================================
--- active/CVE-2013-6282	2013-12-06 04:00:52 UTC (rev 3169)
+++ active/CVE-2013-6282	2013-12-06 06:27:47 UTC (rev 3170)
@@ -6,6 +6,6 @@
 upstream: released (3.6) [8404663f81d212918ff85f493649a7991209fa04]
 2.6.32-upstream-stable:
 sid: released (3.6.4-1~experimental.1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.53-1) [bugfix/arm/ARM-7527-1-uaccess-explicitly-check-__user-pointer-w.patch]
 2.6.32-squeeze-security:
 3.2-upstream-stable:
\ No newline at end of file

Modified: active/CVE-2013-6378
===================================================================
--- active/CVE-2013-6378	2013-12-06 04:00:52 UTC (rev 3169)
+++ active/CVE-2013-6378	2013-12-06 06:27:47 UTC (rev 3170)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc1) [a497e47d4aec37aaf8f13509f3ef3d1f6a717d88]
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/libertas-potential-oops-in-debugfs.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-6380
===================================================================
--- active/CVE-2013-6380	2013-12-06 04:00:52 UTC (rev 3169)
+++ active/CVE-2013-6380	2013-12-06 06:27:47 UTC (rev 3170)
@@ -5,6 +5,6 @@
 upstream: released (3.13-rc1) [b4789b8e6be3151a955ade74872822f30e8cd914]
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/aacraid-prevent-invalid-pointer-dereference.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-6381
===================================================================
--- active/CVE-2013-6381	2013-12-06 04:00:52 UTC (rev 3169)
+++ active/CVE-2013-6381	2013-12-06 06:27:47 UTC (rev 3170)
@@ -5,6 +5,6 @@
 upstream: released (3.13-rc1) [6fb392b1a63ae36c31f62bc3fc8630b49d602b62]
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.53-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-6382
===================================================================
--- active/CVE-2013-6382	2013-12-06 04:00:52 UTC (rev 3169)
+++ active/CVE-2013-6382	2013-12-06 06:27:47 UTC (rev 3170)
@@ -6,6 +6,6 @@
 upstream: needed
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list