[kernel-sec-discuss] r3191 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Sat Dec 21 16:14:09 UTC 2013


Author: jmm
Date: 2013-12-21 16:13:05 +0000 (Sat, 21 Dec 2013)
New Revision: 3191

Modified:
   active/CVE-2013-4587
   active/CVE-2013-6367
   active/CVE-2013-6368
   active/CVE-2013-6376
   active/CVE-2013-6405
   active/CVE-2013-6432
Log:
sid upload


Modified: active/CVE-2013-4587
===================================================================
--- active/CVE-2013-4587	2013-12-19 12:06:12 UTC (rev 3190)
+++ active/CVE-2013-4587	2013-12-21 16:13:05 UTC (rev 3191)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.13-rc4) [338c7dbadd2671189cec7faf64c84d01071b3f96]
 2.6.32-upstream-stable: needed
-sid: pending (3.12.5-1) [bugfix/all/KVM-Improve-create-VCPU-parameter-CVE-2013-4587.patch]
+sid: released (3.12.5-1) [bugfix/all/KVM-Improve-create-VCPU-parameter-CVE-2013-4587.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-6367
===================================================================
--- active/CVE-2013-6367	2013-12-19 12:06:12 UTC (rev 3190)
+++ active/CVE-2013-6367	2013-12-21 16:13:05 UTC (rev 3191)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.13-rc4) [b963a22e6d1a266a67e9eecc88134713fd54775c]
 2.6.32-upstream-stable: needed
-sid: pending (3.12.5-1) [bugfix/all/KVM-x86-Fix-potential-divide-by-0-in-lapic-CVE-2013-.patch]
+sid: released (3.12.5-1) [bugfix/all/KVM-x86-Fix-potential-divide-by-0-in-lapic-CVE-2013-.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-6368
===================================================================
--- active/CVE-2013-6368	2013-12-19 12:06:12 UTC (rev 3190)
+++ active/CVE-2013-6368	2013-12-21 16:13:05 UTC (rev 3191)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.13-rc4) [fda4e2e85589191b123d31cdc21fd33ee70f50fd]
 2.6.32-upstream-stable: needed
-sid: pending (3.12.5-1) [bugfix/x86/KVM-x86-Convert-vapic-synchronization-to-_cached-fun.patch]
+sid: released (3.12.5-1) [bugfix/x86/KVM-x86-Convert-vapic-synchronization-to-_cached-fun.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: needed5A
+3.2-upstream-stable: needed

Modified: active/CVE-2013-6376
===================================================================
--- active/CVE-2013-6376	2013-12-19 12:06:12 UTC (rev 3190)
+++ active/CVE-2013-6376	2013-12-21 16:13:05 UTC (rev 3191)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (3.13-rc4) [17d68b763f09a9ce824ae23eb62c9efc57b69271]
 2.6.32-upstream-stable:
-sid: pending (3.12.5-1) [bugfix/x86/KVM-x86-fix-guest-initiated-crash-with-x2apic-CVE-20.patch]
+sid: released (3.12.5-1) [bugfix/x86/KVM-x86-fix-guest-initiated-crash-with-x2apic-CVE-20.patch]
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-6405
===================================================================
--- active/CVE-2013-6405	2013-12-19 12:06:12 UTC (rev 3190)
+++ active/CVE-2013-6405	2013-12-21 16:13:05 UTC (rev 3191)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
 2.6.32-upstream-stable:
-sid: pending (3.12.4-1)
+sid: released (3.12.4-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-6432
===================================================================
--- active/CVE-2013-6432	2013-12-19 12:06:12 UTC (rev 3190)
+++ active/CVE-2013-6432	2013-12-21 16:13:05 UTC (rev 3191)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.13-rc3) [cf970c002d270c36202bd5b9c2804d3097a52da0]
 2.6.32-upstream-stable: N/A "Introduced in 3.11 with 6d0bfe22611602f36617bc7aa2ffa1bbb2f54c67"
-sid: pending (3.12.4-1)
+sid: released (3.12.4-1)
 3.2-wheezy-security: N/A "Introduced in 3.11 with 6d0bfe22611602f36617bc7aa2ffa1bbb2f54c67"
 2.6.32-squeeze-security: N/A "Introduced in 3.11 with 6d0bfe22611602f36617bc7aa2ffa1bbb2f54c67"
 3.2-upstream-stable: N/A "Introduced in 3.11 with 6d0bfe22611602f36617bc7aa2ffa1bbb2f54c67"




More information about the kernel-sec-discuss mailing list