[kernel-sec-discuss] r3179 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Mon Dec 16 06:29:07 UTC 2013
Author: jmm
Date: 2013-12-16 06:28:03 +0000 (Mon, 16 Dec 2013)
New Revision: 3179
Modified:
active/CVE-2012-2372
active/CVE-2013-2147
active/CVE-2013-2889
active/CVE-2013-2893
active/CVE-2013-2895
active/CVE-2013-2897
active/CVE-2013-2929
active/CVE-2013-4299
active/CVE-2013-4345
active/CVE-2013-4350
active/CVE-2013-4387
active/CVE-2013-4470
active/CVE-2013-4511
active/CVE-2013-4512
active/CVE-2013-4592
active/CVE-2013-6282
active/CVE-2013-6378
active/CVE-2013-6380
active/CVE-2013-6381
active/CVE-2013-6382
Log:
3.2.53 uploaded
Modified: active/CVE-2012-2372
===================================================================
--- active/CVE-2012-2372 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2012-2372 2013-12-16 06:28:03 UTC (rev 3179)
@@ -10,9 +10,9 @@
bwh> Real fix seems to be:
bwh> http://patchwork.ozlabs.org/patch/293827/
Bugs:
-upstream: needed
+upstream: released (3.13-rc3) [18fc25c94eadc52a42c025125af24657a93638c0]
2.6.32-upstream-stable:
sid: released (3.11.10-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
-3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
+3.2-wheezy-security: released (3.2.53-1) [bugfix/all/rds-prevent-bug_on-triggered-by-congestion-update-to-loopback.patch]
2.6.32-squeeze-security:
3.2-upstream-stable:
Modified: active/CVE-2013-2147
===================================================================
--- active/CVE-2013-2147 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-2147 2013-12-16 06:28:03 UTC (rev 3179)
@@ -7,6 +7,6 @@
upstream: released (3.12-rc3)[627aad1c01da6f881e7f98d71fd928ca0c316b1a, 58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e]
2.6.32-upstream-stable: pending (2.6.32.62)
sid: released (3.11.5-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-2889
===================================================================
--- active/CVE-2013-2889 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-2889 2013-12-16 06:28:03 UTC (rev 3179)
@@ -7,6 +7,6 @@
upstream: released (3.12-rc2) [78214e81a1bf43740ce89bb5efda78eac2f8ef83, 331415ff16a12147d57d5c953f3a961b7ede348b]
2.6.32-upstream-stable: pending (2.6.32.62)
sid: released (3.11.5-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-2893
===================================================================
--- active/CVE-2013-2893 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-2893 2013-12-16 06:28:03 UTC (rev 3179)
@@ -7,6 +7,6 @@
upstream: released (3.12-rc2) [0fb6bd06e06792469acc15bbe427361b56ada528, 331415ff16a12147d57d5c953f3a961b7ede348b]
2.6.32-upstream-stable: pending (2.6.32.62)
sid: released (3.11.5-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-2895
===================================================================
--- active/CVE-2013-2895 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-2895 2013-12-16 06:28:03 UTC (rev 3179)
@@ -7,6 +7,6 @@
upstream: released (3.12-rc2) [297502abb32e225fb23801fcdb0e4f6f8e17099a, 331415ff16a12147d57d5c953f3a961b7ede348b]
2.6.32-upstream-stable: N/A "Introduced in 3.2 with 534a7b8e10ec55d9f521e68c20dbb3634c25b98a"
sid: released (3.11.5-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security: N/A "Introduced in 3.2 with 534a7b8e10ec55d9f521e68c20dbb3634c25b98a"
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-2897
===================================================================
--- active/CVE-2013-2897 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-2897 2013-12-16 06:28:03 UTC (rev 3179)
@@ -7,6 +7,6 @@
upstream: released (3.12-rc2) [cc6b54aa54bf40b762cab45a9fc8aa81653146eb, 8821f5dc187bdf16cfb32ef5aa8c3035273fa79a]
2.6.32-upstream-stable: N/A "Introduced in 2.6.38 with 5519cab477b61326963c8d523520db0342862b63"
sid: released (3.11.5-1)
-3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/HID-multitouch-validate-indexes-details.patch]
+3.2-wheezy-security: released (3.2.53-1) [bugfix/all/HID-multitouch-validate-indexes-details.patch]
2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 5519cab477b61326963c8d523520db0342862b63"
3.2-upstream-stable: needed
Modified: active/CVE-2013-2929
===================================================================
--- active/CVE-2013-2929 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-2929 2013-12-16 06:28:03 UTC (rev 3179)
@@ -5,6 +5,6 @@
upstream: released (3.13-rc1) [d049f74f2dbe71354d43d393ac3a188947811348]
2.6.32-upstream-stable: needed
sid: released (3.11.10-1)
-3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
+3.2-wheezy-security: released (3.2.53-1) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-4299
===================================================================
--- active/CVE-2013-4299 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-4299 2013-12-16 06:28:03 UTC (rev 3179)
@@ -5,6 +5,6 @@
upstream: released (3.12-rc6) [e9c6a182649f4259db704ae15a91ac820e63b0ca]
2.6.32-upstream-stable:
sid: released (3.11.6-2) [bugfix/all/dm-snapshot-fix-data-corruption.patch]
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security:
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-4345
===================================================================
--- active/CVE-2013-4345 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-4345 2013-12-16 06:28:03 UTC (rev 3179)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc1) [714b33d15130cbb5ab426456d4e3de842d6c5b8a]
2.6.32-upstream-stable: needed
sid: released (3.11.5-1)
-3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/crypto-ansi_cprng-Fix-off-by-one-error-in-non-block-.patch]
+3.2-wheezy-security: released (3.2.53-1) [bugfix/all/crypto-ansi_cprng-Fix-off-by-one-error-in-non-block-.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-4350
===================================================================
--- active/CVE-2013-4350 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-4350 2013-12-16 06:28:03 UTC (rev 3179)
@@ -5,6 +5,6 @@
upstream: released (3.12-rc2) [95ee62083cb6453e056562d91f597552021e6ae7]
2.6.32-upstream-stable: needed
sid: released (3.11.5-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-4387
===================================================================
--- active/CVE-2013-4387 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-4387 2013-12-16 06:28:03 UTC (rev 3179)
@@ -5,6 +5,6 @@
upstream: released (3.12-rc3) [2811ebac2521ceac84f2bdae402455baa6a7fb47]
2.6.32-upstream-stable: needed
sid: released (3.11.5-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-4470
===================================================================
--- active/CVE-2013-4470 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-4470 2013-12-16 06:28:03 UTC (rev 3179)
@@ -5,6 +5,6 @@
upstream: released (3.12) [c547dbf55d5f8cf615ccc0e7265e98db27d3fb8b, e93b7d748be887cd7639b113ba7d7ef792a7efb9]
2.6.32-upstream-stable:
sid: released (3.11.7-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security:
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-4511
===================================================================
--- active/CVE-2013-4511 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-4511 2013-12-16 06:28:03 UTC (rev 3179)
@@ -6,6 +6,6 @@
upstream: released (3.12) [7314e613d5ff9f0934f7a0f74ed7973b903315d1]
2.6.32-upstream-stable: needed
sid: released (3.11.8-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-4512
===================================================================
--- active/CVE-2013-4512 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-4512 2013-12-16 06:28:03 UTC (rev 3179)
@@ -5,6 +5,6 @@
upstream: released (3.12) [201f99f170df14ba52ea4c52847779042b7a623b]
2.6.32-upstream-stable: needed
sid: released (3.11.8-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-4592
===================================================================
--- active/CVE-2013-4592 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-4592 2013-12-16 06:28:03 UTC (rev 3179)
@@ -5,6 +5,6 @@
upstream: released (3.8) [e40f193f5bb022e927a57a4f5d5194e4f12ddb74, 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8]
2.6.32-upstream-stable:
sid: released (3.8-1)
-3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/KVM-perform-an-invalid-memslot-step-for-gpa-base-cha.patch, bugfix/all/KVM-Fix-iommu-map-unmap-to-handle-memory-slot-moves.patch]
+3.2-wheezy-security: released (3.2.53-1) [bugfix/all/KVM-perform-an-invalid-memslot-step-for-gpa-base-cha.patch, bugfix/all/KVM-Fix-iommu-map-unmap-to-handle-memory-slot-moves.patch]
2.6.32-squeeze-security:
3.2-upstream-stable:
Modified: active/CVE-2013-6282
===================================================================
--- active/CVE-2013-6282 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-6282 2013-12-16 06:28:03 UTC (rev 3179)
@@ -6,6 +6,6 @@
upstream: released (3.6) [8404663f81d212918ff85f493649a7991209fa04]
2.6.32-upstream-stable:
sid: released (3.6.4-1~experimental.1)
-3.2-wheezy-security: pending (3.2.53-1) [bugfix/arm/ARM-7527-1-uaccess-explicitly-check-__user-pointer-w.patch]
+3.2-wheezy-security: released (3.2.53-1) [bugfix/arm/ARM-7527-1-uaccess-explicitly-check-__user-pointer-w.patch]
2.6.32-squeeze-security:
3.2-upstream-stable:
\ No newline at end of file
Modified: active/CVE-2013-6378
===================================================================
--- active/CVE-2013-6378 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-6378 2013-12-16 06:28:03 UTC (rev 3179)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc1) [a497e47d4aec37aaf8f13509f3ef3d1f6a717d88]
2.6.32-upstream-stable: needed
sid: released (3.11.10-1)
-3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/libertas-potential-oops-in-debugfs.patch]
+3.2-wheezy-security: released (3.2.53-1) [bugfix/all/libertas-potential-oops-in-debugfs.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-6380
===================================================================
--- active/CVE-2013-6380 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-6380 2013-12-16 06:28:03 UTC (rev 3179)
@@ -5,6 +5,6 @@
upstream: released (3.13-rc1) [b4789b8e6be3151a955ade74872822f30e8cd914]
2.6.32-upstream-stable: needed
sid: released (3.11.10-1)
-3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/aacraid-prevent-invalid-pointer-dereference.patch]
+3.2-wheezy-security: released (3.2.53-1) [bugfix/all/aacraid-prevent-invalid-pointer-dereference.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-6381
===================================================================
--- active/CVE-2013-6381 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-6381 2013-12-16 06:28:03 UTC (rev 3179)
@@ -5,6 +5,6 @@
upstream: released (3.13-rc1) [6fb392b1a63ae36c31f62bc3fc8630b49d602b62]
2.6.32-upstream-stable: needed
sid: released (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
-3.2-wheezy-security: pending (3.2.53-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
+3.2-wheezy-security: released (3.2.53-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-6382
===================================================================
--- active/CVE-2013-6382 2013-12-13 06:57:01 UTC (rev 3178)
+++ active/CVE-2013-6382 2013-12-16 06:28:03 UTC (rev 3179)
@@ -6,6 +6,6 @@
upstream: needed
2.6.32-upstream-stable: needed
sid: released (3.11.10-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
-3.2-wheezy-security: pending (3.2.53-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
+3.2-wheezy-security: released (3.2.53-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list