[kernel-sec-discuss] r2931 - active

Ben Hutchings benh at alioth.debian.org
Sat May 4 17:06:33 UTC 2013


Author: benh
Date: 2013-05-04 17:06:11 +0000 (Sat, 04 May 2013)
New Revision: 2931

Modified:
   active/CVE-2012-2372
   active/CVE-2012-4542
   active/CVE-2013-0343
   active/CVE-2013-1819
   active/CVE-2013-1929
   active/CVE-2013-1956
   active/CVE-2013-1957
   active/CVE-2013-1958
   active/CVE-2013-1979
   active/CVE-2013-2015
   active/CVE-2013-3076
   active/CVE-2013-3222
   active/CVE-2013-3223
   active/CVE-2013-3224
   active/CVE-2013-3225
   active/CVE-2013-3227
   active/CVE-2013-3228
   active/CVE-2013-3229
   active/CVE-2013-3231
   active/CVE-2013-3234
   active/CVE-2013-3235
   active/CVE-2013-3301
   active/CVE-2013-3302
Log:
Split wheezy and sid status for issues not already fixed in both

Modified: active/CVE-2012-2372
===================================================================
--- active/CVE-2012-2372	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2012-2372	2013-05-04 17:06:11 UTC (rev 2931)
@@ -9,5 +9,6 @@
 upstream: needed
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2012-4542
===================================================================
--- active/CVE-2012-4542	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2012-4542	2013-05-04 17:06:11 UTC (rev 2931)
@@ -7,5 +7,6 @@
 upstream:
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-0343
===================================================================
--- active/CVE-2013-0343	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-0343	2013-05-04 17:06:11 UTC (rev 2931)
@@ -7,5 +7,6 @@
 upstream:
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-1819
===================================================================
--- active/CVE-2013-1819	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-1819	2013-05-04 17:06:11 UTC (rev 2931)
@@ -8,5 +8,6 @@
 upstream: released (3.8) [eb178619f930fa2ba2348de332a1ff1c66a31424]
 2.6.32-upstream-stable: needed
 sid: needed
+3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-1929
===================================================================
--- active/CVE-2013-1929	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-1929	2013-05-04 17:06:11 UTC (rev 2931)
@@ -6,6 +6,7 @@
 Bugs:
 upstream: released (3.9-rc6) [715230a44310a8cf66fbfb5a46f9a62a9b2de424]
 2.6.32-upstream-stable: N/A "code not present"
-sid: pending (3.2.44-1)
+sid: 
+3.2-wheezy-security: pending (3.2.44-1)
 2.6.32-squeeze-security: pending (2.6.32-48squeeze2) [features/all/tg3/0209-tg3-fix-length-overflow-in-VPD-firmware-parsing.patch]
 3.2-upstream-stable: released (3.2.43)

Modified: active/CVE-2013-1956
===================================================================
--- active/CVE-2013-1956	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-1956	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [3151527ee007b73a0ebd296010f1c0454a919c7d]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-1957
===================================================================
--- active/CVE-2013-1957	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-1957	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [90563b198e4c6674c63672fae1923da467215f45, 132c94e31b8bca8ea921f9f96a57d684fa4ae0a9]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-1958
===================================================================
--- active/CVE-2013-1958	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-1958	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [92f28d973cce45ef5823209aab3138eb45d8b349]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-1979
===================================================================
--- active/CVE-2013-1979	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-1979	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [83f1b4ba917db5dc5a061a44b3403ddb6e783494]
 2.6.32-upstream-stable: N/A "Introduced in 2.6.36 with 257b5358b32f17e0603b6ff57b13610b0e02348f"
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: N/A "Introduced in 2.6.36 with 257b5358b32f17e0603b6ff57b13610b0e02348f"
 3.2-upstream-stable:

Modified: active/CVE-2013-2015
===================================================================
--- active/CVE-2013-2015	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-2015	2013-05-04 17:06:11 UTC (rev 2931)
@@ -6,5 +6,6 @@
 upstream: released (3.8) [0e9a9a1ad619e7e987815d20262d36a2f95717ca]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-3076
===================================================================
--- active/CVE-2013-3076	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3076	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [72a763d805a48ac8c0bf48fdb510e84c12de51fe]
 2.6.32-upstream-stable: N/A "algif_hash not yet present"
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: N/A "algif_hash not yet present"
 3.2-upstream-stable:

Modified: active/CVE-2013-3222
===================================================================
--- active/CVE-2013-3222	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3222	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [9b3e617f3df53822345a8573b6d358f6b9e5ed87]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: pending (2.6.32-48squeeze2) [bugfix/all/atm-update-msg_namelen-in-vcc_recvmsg.patch]
 3.2-upstream-stable:

Modified: active/CVE-2013-3223
===================================================================
--- active/CVE-2013-3223	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3223	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [ef3313e84acbf349caecae942ab3ab731471f1a1]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: pending (2.6.32-48squeeze2) [bugfix/all/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch]
 3.2-upstream-stable:

Modified: active/CVE-2013-3224
===================================================================
--- active/CVE-2013-3224	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3224	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [4683f42fde3977bdb4e8a09622788cc8b5313778]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: pending (2.6.32-48squeeze2) [bugfix/all/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch]
 3.2-upstream-stable:

Modified: active/CVE-2013-3225
===================================================================
--- active/CVE-2013-3225	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3225	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [e11e0455c0d7d3d62276a0c55d9dfbc16779d691]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: pending (2.6.32-48squeeze2) [bugfix/all/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch]
 3.2-upstream-stable:

Modified: active/CVE-2013-3227
===================================================================
--- active/CVE-2013-3227	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3227	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [2d6fbfe733f35c6b355c216644e08e149c61b271]
 2.6.32-upstream-stable: N/A "CAIF introduced in 2.6.35"
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: N/A "CAIF introduced in 2.6.35"
 3.2-upstream-stable:

Modified: active/CVE-2013-3228
===================================================================
--- active/CVE-2013-3228	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3228	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [5ae94c0d2f0bed41d6718be743985d61b7f5c47d]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: pending (2.6.32-48squeeze2) [bugfix/all/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch]
 3.2-upstream-stable:

Modified: active/CVE-2013-3229
===================================================================
--- active/CVE-2013-3229	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3229	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [a5598bd9c087dc0efc250a5221e5d0e6f584ee88]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: pending (2.6.32-48squeeze2) [bugfix/all/iucv-Fix-missing-msg_namelen-update-in-iucv_sock_rec.patch]
 3.2-upstream-stable:

Modified: active/CVE-2013-3231
===================================================================
--- active/CVE-2013-3231	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3231	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [c77a4b9cffb6215a15196ec499490d116dfad181]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: pending (2.6.32-48squeeze2) [bugfix/all/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch]
 3.2-upstream-stable:

Modified: active/CVE-2013-3234
===================================================================
--- active/CVE-2013-3234	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3234	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [4a184233f21645cf0b719366210ed445d1024d72]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: pending (2.6.32-48squeeze2) [bugfix/all/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch]
 3.2-upstream-stable:

Modified: active/CVE-2013-3235
===================================================================
--- active/CVE-2013-3235	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3235	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.9) [60085c3d009b0df252547adb336d1ccca5ce52ec]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security: pending (2.6.32-48squeeze2) [bugfix/all/tipc-fix-info-leaks-via-msg_name-in-recv_msg-recv_st.patch]
 3.2-upstream-stable:

Modified: active/CVE-2013-3301
===================================================================
--- active/CVE-2013-3301	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3301	2013-05-04 17:06:11 UTC (rev 2931)
@@ -7,5 +7,6 @@
 upstream: released (3.9) [6a76f8c0ab19f215af2a3442870eeb5f0e81998d]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable: released (3.2.44)

Modified: active/CVE-2013-3302
===================================================================
--- active/CVE-2013-3302	2013-05-04 01:45:53 UTC (rev 2930)
+++ active/CVE-2013-3302	2013-05-04 17:06:11 UTC (rev 2931)
@@ -5,5 +5,6 @@
 upstream: released (3.8) [ea702b80e0bbb2448e201472127288beb82ca2fe]
 2.6.32-upstream-stable:
 sid:
+3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.2-upstream-stable:




More information about the kernel-sec-discuss mailing list