[kernel-sec-discuss] r2955 - active

Dann Frazier dannf at alioth.debian.org
Wed May 15 02:03:20 UTC 2013


Author: dannf
Date: 2013-05-15 02:02:58 +0000 (Wed, 15 May 2013)
New Revision: 2955

Modified:
   active/CVE-2010-4805
   active/CVE-2011-1020
   active/CVE-2011-2695
   active/CVE-2011-2699
   active/CVE-2011-4131
   active/CVE-2012-2121
   active/CVE-2012-2372
   active/CVE-2012-2375
   active/CVE-2012-2390
   active/CVE-2012-3412
   active/CVE-2012-3430
   active/CVE-2012-3552
   active/CVE-2012-4398
   active/CVE-2012-4444
   active/CVE-2012-4461
   active/CVE-2012-4508
   active/CVE-2012-4530
   active/CVE-2012-4542
   active/CVE-2012-4565
   active/CVE-2012-6537
   active/CVE-2012-6539
   active/CVE-2012-6540
   active/CVE-2012-6542
   active/CVE-2012-6544
   active/CVE-2012-6545
   active/CVE-2012-6546
   active/CVE-2012-6548
   active/CVE-2012-6549
   active/CVE-2013-0160
   active/CVE-2013-0190
   active/CVE-2013-0228
   active/CVE-2013-0268
   active/CVE-2013-0343
   active/CVE-2013-0349
   active/CVE-2013-0871
   active/CVE-2013-0914
   active/CVE-2013-1767
   active/CVE-2013-1773
   active/CVE-2013-1774
   active/CVE-2013-1792
   active/CVE-2013-1796
   active/CVE-2013-1797
   active/CVE-2013-1798
   active/CVE-2013-1826
   active/CVE-2013-1860
   active/CVE-2013-1928
   active/CVE-2013-1956
   active/CVE-2013-1957
   active/CVE-2013-2015
   active/CVE-2013-2634
   active/CVE-2013-3076
   active/CVE-2013-3222
   active/CVE-2013-3223
   active/CVE-2013-3224
   active/CVE-2013-3225
   active/CVE-2013-3227
   active/CVE-2013-3228
   active/CVE-2013-3229
   active/CVE-2013-3231
   active/CVE-2013-3234
   active/CVE-2013-3235
   active/CVE-2013-3301
   active/CVE-2013-3302
Log:
wheezy and 3.2-upstream updates


Modified: active/CVE-2010-4805
===================================================================
--- active/CVE-2010-4805	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2010-4805	2013-05-15 02:02:58 UTC (rev 2955)
@@ -8,6 +8,7 @@
 upstream: released (2.6.35)
 2.6.32-upstream-stable: needed
 sid: released (2.6.35-1)
+3.2-wheezy-security: N/A
 2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/net-sk_add_backlog-take-remem_alloc-into-account.patch]
 3.2-upstream-stable: N/A
 

Modified: active/CVE-2011-1020
===================================================================
--- active/CVE-2011-1020	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2011-1020	2013-05-15 02:02:58 UTC (rev 2955)
@@ -9,5 +9,6 @@
 2.6.32-upstream-stable: needed
 sid: released (2.6.39-1)
 2.6.26-lenny-security: released (2.6.26-26lenny4) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch]
+3.2-wheezy-security: N/A
 2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch, bugfix/all/proc-syscall-stack-personality-races.patch]
 3.2-upstream-stable: N/A

Modified: active/CVE-2011-2695
===================================================================
--- active/CVE-2011-2695	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2011-2695	2013-05-15 02:02:58 UTC (rev 2955)
@@ -6,5 +6,6 @@
 upstream: released (3.0) [f17722f917b2f21497deb6edc62fb1683daa08e6]
 2.6.32-upstream-stable: pending
 sid: released (3.0.0-1)
+3.2-wheezy-security: N/A
 2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/ext4-Fix-max-file-size-and-logical-block-counting-of-extent-format-file.patch]
 3.2-upstream-stable: N/A

Modified: active/CVE-2011-2699
===================================================================
--- active/CVE-2011-2699	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2011-2699	2013-05-15 02:02:58 UTC (rev 2955)
@@ -11,5 +11,6 @@
 2.6.32-upstream-stable: pending
 sid: released (3.0.0-2) [bugfix/all/stable/3.0.2.patch]
 2.6.26-lenny-security: ignored "end of life"
+3.2-wheezy-security: N/A
 2.6.32-squeeze-security: released (2.6.32-41)
 3.2-upstream-stable: N/A

Modified: active/CVE-2011-4131
===================================================================
--- active/CVE-2011-4131	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2011-4131	2013-05-15 02:02:58 UTC (rev 2955)
@@ -10,5 +10,6 @@
 upstream: released (3.3-rc5) [e5012d1f3861d18c7f3814e757c1c3ab3741dbcd, bf118a342f10dafe44b14451a1392c3254629a1f, de040beccd52bb5fcac90031505384d037b1111c, 331818f1c468a24e581aedcbe52af799366a9dfe]
 2.6.32-upstream-stable: needed "partial fix in 2.6.32.44"
 sid: released (3.2.19-1)
+3.2-wheezy-security: released (3.2.19-1)
 2.6.32-squeeze-security: needed "partial fix in 2.6.32-36"
 3.2-upstream-stable: released (3.2.19) [e5012d1f3861d18c7f3814e757c1c3ab3741dbcd, 4a818b4288d5a897b0e928dd0cd1e1e29501159f, 4910b0c6a122dade90898c079027423a3204ac44, 84e017e3ff4113a32c827f2d7f96e1a9b1f7a677]

Modified: active/CVE-2012-2121
===================================================================
--- active/CVE-2012-2121	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-2121	2013-05-15 02:02:58 UTC (rev 2955)
@@ -5,5 +5,6 @@
 upstream: released (3.4-rc4) [32f6daad4651a748a58a3ab6da0611862175722f, 21a1416a1c945c5aeaeaf791b63c64926018eb77]
 2.6.32-upstream-stable:
 sid: released (3.2.17-1) [bugfix/all/kvm-lock-slots_lock-around-device-assignment.patch]
+3.2-wheezy-security: released (3.2.19-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/x86/KVM-unmap-pages-from-the-iommu-when-slots-are-remove.patch, bugfix/x86/KVM-lock-slots_lock-around-device-assignment.patch]
 3.2-upstream-stable: released (3.2.19) [1e57aab4e6c549804298f07fac0b6fc77f10fab2, 50fcec93e8c917b4f6e1a3219207d351e6eae1b2]

Modified: active/CVE-2012-2372
===================================================================
--- active/CVE-2012-2372	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-2372	2013-05-15 02:02:58 UTC (rev 2955)
@@ -11,6 +11,6 @@
 upstream: needed
 2.6.32-upstream-stable:
 sid:
-3.2-wheezy-security:
+3.2-wheezy-security: ignored (3.2.41-2+deb7u1) "no upstream fix as of 2013.05.05"
 2.6.32-squeeze-security: ignored (2.6.32-48squeeze2) "no upstream fix as of 2013.05.05"
 3.2-upstream-stable:

Modified: active/CVE-2012-2375
===================================================================
--- active/CVE-2012-2375	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-2375	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.2.19-1)
 2.6.32-squeeze-security: ignored (2.6.32-48squeeze2) "dependent upon fix for CVE-2011-4131"
+3.2-wheezy-security: released (3.2.19-1)
 3.2-upstream-stable: released (3.2.19) [a94841724154dac38ce5239d1d88c00e758dc20d, b7d52ac86a9753520a696af25d333e3451eeae92, 84e017e3ff4113a32c827f2d7f96e1a9b1f7a677]

Modified: active/CVE-2012-2390
===================================================================
--- active/CVE-2012-2390	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-2390	2013-05-15 02:02:58 UTC (rev 2955)
@@ -9,4 +9,5 @@
 2.6.32-upstream-stable: pending
 sid: released (3.2.19-1) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-null-pointer.patch]
 2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-NULL-pointer.patch]
+3.2-wheezy-security: released (3.2.19-1)
 3.2-upstream-stable: released (3.2.20) [queue-3.2/hugetlb-fix-resv_map-leak-in-error-path.patch, queue-3.2/mm-fix-vma_resv_map-null-pointer.patch]

Modified: active/CVE-2012-3412
===================================================================
--- active/CVE-2012-3412	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-3412	2013-05-15 02:02:58 UTC (rev 2955)
@@ -15,4 +15,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.29-1) [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
 2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
+3.2-wheezy-security: released (3.2.29-1)
 3.2-upstream-stable: released (3.2.30) [net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, tcp-apply-device-tso-segment-limit-earlier.patch]

Modified: active/CVE-2012-3430
===================================================================
--- active/CVE-2012-3430	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-3430	2013-05-15 02:02:58 UTC (rev 2955)
@@ -6,4 +6,5 @@
 2.6.32-upstream-stable: pending
 sid: released (3.2.29-1) [bugfix/all/rds-set-correct-msg_namelen.patch]
 2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/rds-set-correct-msg_namelen.patch]
+3.2-wheezy-security: released (3.2.29-1)
 3.2-upstream-stable: released (3.2.31)

Modified: active/CVE-2012-3552
===================================================================
--- active/CVE-2012-3552	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-3552	2013-05-15 02:02:58 UTC (rev 2955)
@@ -6,4 +6,5 @@
 2.6.32-upstream-stable: 
 sid: released (3.0-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/inet-add-RCU-protection-to-inet-opt.patch]
+3.2-wheezy-security: N/A
 3.2-upstream-stable: N/A

Modified: active/CVE-2012-4398
===================================================================
--- active/CVE-2012-4398	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-4398	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable: pending
 sid: released (3.2.35-1)
 2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/usermodehelper-introduce-umh_complete.patch, bugfix/all/usermodehelper-implement-UMH_KILLABLE.patch, bugfix/all/usermodehelper-____call_usermodehelper-doesnt-need-do_exit.patch, bugfix/all/kmod-introduce-call_modprobe-helper.patch, bugfix/all/kmod-make-__request_module-killable.patch]
+3.2-wheezy-security: released (3.2.35-1)
 3.2-upstream-stable: released (3.2.40)

Modified: active/CVE-2012-4444
===================================================================
--- active/CVE-2012-4444	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-4444	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,3 +7,4 @@
 sid: released (2.6.36-1~experimental.1)
 2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/ipv6-discard-overlapping-fragment.patch]
 3.2-upstream-stable: N/A
+3.2-wheezy-security: N/A

Modified: active/CVE-2012-4461
===================================================================
--- active/CVE-2012-4461	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-4461	2013-05-15 02:02:58 UTC (rev 2955)
@@ -9,3 +9,4 @@
 sid: released (3.2.35-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/x86/KVM-x86-invalid-opcode-oops-on-SET_SREGS-with-OSXSAV.patch]
 3.2-upstream-stable: released (3.2.36)
+3.2-wheezy-security: released (3.2.35-1)

Modified: active/CVE-2012-4508
===================================================================
--- active/CVE-2012-4508	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-4508	2013-05-15 02:02:58 UTC (rev 2955)
@@ -8,3 +8,4 @@
 sid: released (3.2.35-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ext4-AIO-vs-fallocate-stale-data-exposure.patch]
 3.2-upstream-stable: released (3.2.33)
+3.2-wheezy-security: released (3.2.35-1)

Modified: active/CVE-2012-4530
===================================================================
--- active/CVE-2012-4530	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-4530	2013-05-15 02:02:58 UTC (rev 2955)
@@ -10,3 +10,4 @@
 sid: released (3.2.35-1)
 2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/exec-do-not-leave-bprm-interp-on-stack.patch, bugfix/all/exec-use-ELOOP-for-max-recursion-depth.patch]
 3.2-upstream-stable: released (3.2.36)
+3.2-wheezy-security: released (3.2.35-1)

Modified: active/CVE-2012-4542
===================================================================
--- active/CVE-2012-4542	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-4542	2013-05-15 02:02:58 UTC (rev 2955)
@@ -11,3 +11,4 @@
 3.2-wheezy-security:
 2.6.32-squeeze-security: ignored (2.6.32-48squeeze2) "no upstream fix as of 2013.05.05"
 3.2-upstream-stable:
+3.2-wheezy-security: ignored (3.2.41+deb7u1) "no upstream fix as of 2013.05.05"

Modified: active/CVE-2012-4565
===================================================================
--- active/CVE-2012-4565	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-4565	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable: pending
 sid: released (3.2.35-1)
 2.6.32-squeeze-security: released (2.6.32-48) [bugfix/all/net-fix-divide-by-zero-in-tcp-algorithm-illinois.patch]
+3.2-wheezy-security: released (3.2.35-1)
 3.2-upstream-stable: released (3.2.34) [df769f065d7bebf0ddc5f61605dbb1d8ea5ee2d8]

Modified: active/CVE-2012-6537
===================================================================
--- active/CVE-2012-6537	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-6537	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.2.32-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/xfrm_user-fix-info-leak-in-copy_to_user_state.patch, bugfix/all/xfrm_user-fix-info-leak-in-copy_to_user_policy.patch, bugfix/all/xfrm_user-fix-info-leak-in-copy_to_user_tmpl.patch]
-3.2-upstream-stable: released (3.2.31)
\ No newline at end of file
+3.2-upstream-stable: released (3.2.31) [e470a5bc5c80cad5d8877701784351c2d8cdb6bc, bc39fa8d3deb34d5d0cfd86aafb8033ac4a4ed90, 26d560eb8ee3e6dd505a5a8a43ff904c279f60ce]
+3.2-wheezy-security: released (3.2.32-1)
\ No newline at end of file

Modified: active/CVE-2012-6539
===================================================================
--- active/CVE-2012-6539	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-6539	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/net-fix-info-leak-in-compat-dev_ifconf.patch]
-3.2-upstream-stable: released (3.2.30)
+3.2-upstream-stable: released (3.2.30) [daf8fa93325e55ec605c4e725e6dc07d63d0d5c1]
+3.2-wheezy-security: released (3.2.30-1)

Modified: active/CVE-2012-6540
===================================================================
--- active/CVE-2012-6540	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-6540	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ipvs-fix-info-leak-in-getsockopt-IP_VS_SO_GET_TIMEOU.patch]
-3.2-upstream-stable: released (3.2.30)
+3.2-upstream-stable: released (3.2.30) [9b2a14018c8a62cf910e10efb4b24787549de5c4]
+3.2-wheezy-security: released (3.2.30-1)

Modified: active/CVE-2012-6542
===================================================================
--- active/CVE-2012-6542	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-6542	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable: 
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/llc-fix-info-leak-via-getsockname.patch]
-3.2-upstream-stable: released (3.2.30)
+3.2-upstream-stable: released (3.2.30) [3f497daadeeb2b84dc8e97b32416d98b34485b99]
+3.2-wheezy-security: released (3.2.30-1)

Modified: active/CVE-2012-6544
===================================================================
--- active/CVE-2012-6544	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-6544	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/Bluetooth-L2CAP-Fix-info-leak-via-getsockname.patch, bugfix/all/Bluetooth-HCI-Fix-info-leak-in-getsockopt-HCI_FILTER.patch]
-3.2-upstream-stable: released (3.2.30)
+3.2-upstream-stable: released (3.2.30) [79690021eba0738861965187af2f75035f846d6f, 1ec7005779d27fabc6fb64f0852745aaac4a66d2, 2c7571e8eccb318337c06e09871ce0bf9868b93a]
+3.2-wheezy-security: released (3.2.30-1)

Modified: active/CVE-2012-6545
===================================================================
--- active/CVE-2012-6545	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-6545	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/Bluetooth-RFCOMM-Fix-info-leak-via-getsockname.patch, bugfix/all/Bluetooth-RFCOMM-Fix-info-leak-in-ioctl-RFCOMMGETDEV.patch]
-3.2-upstream-stable: released (3.2.30)
+3.2-upstream-stable: released (3.2.30) [18fc748c13b0a15152bd711c3d42560f833af9e5, 2ab341d741cb33f5e69893f6871cf4a4d7bfd3f5, 1621af48f4c2cf3e10438507bea36af7189603b9]
+3.2-wheezy-security: released (3.2.30-1)

Modified: active/CVE-2012-6546
===================================================================
--- active/CVE-2012-6546	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-6546	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/atm-fix-info-leak-via-getsockname.patch, bugfix/all/atm-fix-info-leak-in-getsockopt-SO_ATMPVC.patch]
-3.2-upstream-stable: released (3.2.30)
+3.2-upstream-stable: released (3.2.30) [86cbb1ef4f7b1e6ac6cb65bb34b6949cd5b90c6e, 3d9e0c7f9adf3b5bbdc257d4c70ead09947cc304]
+3.2-wheezy-security: released (3.2.30-1)

Modified: active/CVE-2012-6548
===================================================================
--- active/CVE-2012-6548	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-6548	2013-05-15 02:02:58 UTC (rev 2955)
@@ -8,3 +8,4 @@
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/udf-avoid-info-leak-on-export.patch]
 3.2-upstream-stable: released (3.2.42)
+3.2-wheezy-security: released (3.2.41-1)

Modified: active/CVE-2012-6549
===================================================================
--- active/CVE-2012-6549	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2012-6549	2013-05-15 02:02:58 UTC (rev 2955)
@@ -8,3 +8,4 @@
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/isofs-avoid-info-leak-on-export.patch]
 3.2-upstream-stable: released (3.2.42)
+3.2-wheezy-security: released (3.2.41-1)

Modified: active/CVE-2013-0160
===================================================================
--- active/CVE-2013-0160	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-0160	2013-05-15 02:02:58 UTC (rev 2955)
@@ -1,10 +1,11 @@
 Description: Local users can obtain keystroke timing through inotify on ptmx
-References: http://www.openwall.com/lists/oss-security/2013/01/08/3
+References: http://www.openwall.com/lists/oss-security/2013/01/07/5
 Notes:
 Bugs:
-upstream: pending [b0b885657b6c8ef63a46bc9299b2a7715d19acde, 37b7f3c76595e23257f61bd80b223de8658617ee, b0b885657b6c8ef63a46bc9299b2a7715d19acde]
+upstream: pending [b0b885657b6c, b0de59b5733d, 37b7f3c76595]
 2.6.32-upstream-stable:
 sid: released (3.8.12-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security:
-3.2-upstream-stable: pending (3.2.45-rc1) [tty-do-not-update-atime-mtime-on-read-write.patch, tty-fix-atime-mtime-regression.patch, tty-fix-up-atime-mtime-mess-take-three.patch]
+3.2-upstream-stable: released (3.2.45) [cd945654552d978b84c0825c7206b2d0667a1272, c29ad805df8c54a9f5d74c66bf5d4a2d449bd99a, 0b28f5865ef23d2bcee122d75b4aea1e2f052624]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/TTY-do-not-update-atime-mtime-on-read-write.patch, bugfix/all/TTY-fix-atime-mtime-regression.patch, bugfix/all/tty-fix-up-atime-mtime-mess-take-three.patch]

Modified: active/CVE-2013-0190
===================================================================
--- active/CVE-2013-0190	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-0190	2013-05-15 02:02:58 UTC (rev 2955)
@@ -8,3 +8,4 @@
 sid: released (3.2.39-1)
 2.6.32-squeeze-security: released (2.6.32-47) [bugfix/x86/xen-Fix-stack-corruption-in-xen_failsafe_callback-fo.patch]
 3.2-upstream-stable: released (3.2.38) [5c0ce9fed10a58f65fe2784b664e03bdeaaac650]
+3.2-wheezy-security: released (3.2.39-1)

Modified: active/CVE-2013-0228
===================================================================
--- active/CVE-2013-0228	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-0228	2013-05-15 02:02:58 UTC (rev 2955)
@@ -8,3 +8,4 @@
 sid: released (3.2.39-1)
 2.6.32-squeeze-security: released (2.6.32-48) [features/all/xen/xsa42-pvops-0001-x86-xen-don-t-assume-ds-is-usable-in-xen_iret-for-32.patch]
 3.2-upstream-stable: released (3.2.39) [x86-xen-don-t-assume-ds-is-usable-in-xen_iret-for-32-bit-pvops.patch]
+3.2-wheezy-security: released (3.2.39-1)

Modified: active/CVE-2013-0268
===================================================================
--- active/CVE-2013-0268	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-0268	2013-05-15 02:02:58 UTC (rev 2955)
@@ -6,4 +6,5 @@
 2.6.32-upstream-stable: pending
 sid: released (3.2.39-1)
 2.6.32-squeeze-security: released (2.6.32-48) [bugfix/x86/msr-add-capabilities-check.patch]
-3.2-upstream-stable: released (3.2.38)
+3.2-upstream-stable: released (3.2.38) [6ebf5f3dfa9dfd384169f001eecf4e5119c670cc]
+3.2-wheezy-security: released (3.2.39-1)

Modified: active/CVE-2013-0343
===================================================================
--- active/CVE-2013-0343	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-0343	2013-05-15 02:02:58 UTC (rev 2955)
@@ -10,3 +10,4 @@
 3.2-wheezy-security:
 2.6.32-squeeze-security: ignored (2.6.32-48squeeze2) "no upstream fix as of 2013.05.05"
 3.2-upstream-stable:
+3.2-wheezy-security: ignored (3.2.41-2+deb7u1) "no upstream fix as of 2013.05.05"

Modified: active/CVE-2013-0349
===================================================================
--- active/CVE-2013-0349	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-0349	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable: pending
 sid: released (3.2.39-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/Bluetooth-Fix-incorrect-strncpy-in-hidp_setup_hid.patch]
-3.2-upstream-stable: released (3.2.38)
+3.2-upstream-stable: released (3.2.38) [150df53ab8dfcdf0b3872a60f7a092c4e541f138]
+3.2-wheezy-security: released (3.2.39-1)

Modified: active/CVE-2013-0871
===================================================================
--- active/CVE-2013-0871	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-0871	2013-05-15 02:02:58 UTC (rev 2955)
@@ -10,3 +10,4 @@
 sid: released (3.2.39-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ptrace-ptrace_resume-shouldnt-wake-up-TASK_TRACED-thread.patch, bugfix/all/ptrace-introduce-signal_wake_up_state-and-ptrace_signal_wake_up.patch, bugfix/all/ptrace-ensure-arch_ptrace-ptrace_request-can-never-race-with-SIGKILL.patch, bugfix/all/wake_up_process-should-be-never-used-to-wakeup-a-TASK_STOPPED-TRACED-task.patch, bugfix/all/fix-ptrace-when-task-is-in-task_is_stopped-state.patch]
 3.2-upstream-stable: released (3.2.39) [ptrace-introduce-signal_wake_up_state-and-ptrace_signal_wake_up.patch, ptrace-ensure-arch_ptrace-ptrace_request-can-never-race-with.patch, wake_up_process-should-be-never-used-to-wakeup-a.patch]
+3.2-wheezy-security: released (3.2.39-1)

Modified: active/CVE-2013-0914
===================================================================
--- active/CVE-2013-0914	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-0914	2013-05-15 02:02:58 UTC (rev 2955)
@@ -8,3 +8,4 @@
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/signal-always-clear-sa_restorer-on-execve.patch, bugfix/all/signal-Define-__ARCH_HAS_SA_RESTORER-so-we-know-whet.patch, bugfix/all/kernel-signal.c-use-__ARCH_HAS_SA_RESTORER-instead-o.patch]
 3.2-upstream-stable: released (3.2.41) [signal-always-clear-sa_restorer-on-execve.patch]
+3.2-wheezy-security: released (3.2.41-1)

Modified: active/CVE-2013-1767
===================================================================
--- active/CVE-2013-1767	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1767	2013-05-15 02:02:58 UTC (rev 2955)
@@ -8,3 +8,4 @@
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/tmpfs-fix-use-after-free-of-mempolicy-object.patch]
 3.2-upstream-stable: released (3.2.40)
+3.2-wheezy-security: released (3.2.41-1)

Modified: active/CVE-2013-1773
===================================================================
--- active/CVE-2013-1773	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1773	2013-05-15 02:02:58 UTC (rev 2955)
@@ -6,4 +6,6 @@
 2.6.32-upstream-stable:
 sid: released (3.2.15-1) [features/x86/hyperv/0001-NLS-improve-UTF8-UTF16-string-conversion-routine.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/fat-Fix-stat-f_namelen.patch, bugfix/all/NLS-improve-UTF8-UTF16-string-conversion-routine.patch, debian/nls-Avoid-ABI-change-for-CVE-2013-1773-fix.patch]
-3.2-upstream-stable: released (3.2.41) [nls-improve-utf8-utf16-string-conversion-routine.patch]
+3.2-upstream-stable: released (3.2.41) [6022b67230dcb25c267e832d72223ffb54703cc8]
+3.2-wheezy-security: released (3.2.41-1)
+

Modified: active/CVE-2013-1774
===================================================================
--- active/CVE-2013-1774	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1774	2013-05-15 02:02:58 UTC (rev 2955)
@@ -6,4 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.38-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/USB-io_ti-Fix-Null-dereference-in-chase-port.patch]
-3.2-upstream-stable: released (3.2.38)
+3.2-upstream-stable: released (3.2.38) [7b4992729ddd232f6026c109f93d8296ca58b3ed]
+3.2-wheezy-security: released (3.2.39-1)

Modified: active/CVE-2013-1792
===================================================================
--- active/CVE-2013-1792	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1792	2013-05-15 02:02:58 UTC (rev 2955)
@@ -8,4 +8,5 @@
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/keys-fix-race-with-concurrent-install_user_keyrings.patch]
 3.2-upstream-stable: released (3.2.41) [keys-fix-race-with-concurrent-install_user_keyrings.patch]
+3.2-wheezy-security: released (3.2.41-1)
 

Modified: active/CVE-2013-1796
===================================================================
--- active/CVE-2013-1796	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1796	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,3 +7,4 @@
 sid: released (3.2.41-2) [bugfix/x86/KVM-x86-fix-for-buffer-overflow-in-handling-of-MSR_K.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/x86/KVM-x86-fix-for-buffer-overflow-in-handling-of-MSR_K.patch, bugfix/x86/KVM-x86-relax-MSR_KVM_SYSTEM_TIME-alignment-check.patch]
 3.2-upstream-stable: released (3.2.44)
+3.2-wheezy-security: released (3.2.41-2)

Modified: active/CVE-2013-1797
===================================================================
--- active/CVE-2013-1797	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1797	2013-05-15 02:02:58 UTC (rev 2955)
@@ -9,3 +9,4 @@
 sid: released (3.2.41-2) [bugfix/x86/KVM-x86-Convert-MSR_KVM_SYSTEM_TIME-to-use-gfn_to_hv.patch]
 2.6.32-squeeze-security:
 3.2-upstream-stable: released (3.2.44)
+3.2-wheezy-security: released (3.2.41-2)

Modified: active/CVE-2013-1798
===================================================================
--- active/CVE-2013-1798	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1798	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,3 +7,4 @@
 sid: released (3.2.41-2) [bugfix/all/KVM-Fix-bounds-checking-in-ioapic-indirect-register-.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/KVM-Fix-bounds-checking-in-ioapic-indirect-register-.patch]
 3.2-upstream-stable: released (3.2.44)
+3.2-wheezy-security: released (3.2.41-2)

Modified: active/CVE-2013-1826
===================================================================
--- active/CVE-2013-1826	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1826	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.32-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/xfrm_user-return-error-pointer-instead-of-NULL.patch, bugfix/all/xfrm_user-return-error-pointer-instead-of-NULL-2.patch]
-3.2-upstream-stable: released (3.2.31)
+3.2-upstream-stable: released (3.2.31) [468bf9f70353872173b11b92dc15fe84d3dacbb4, 61819032c7d98c35d2f475032f3c9e30948feaf4]
+3.2-wheezy-security: released (3.2.32-1)

Modified: active/CVE-2013-1860
===================================================================
--- active/CVE-2013-1860	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1860	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,3 +7,4 @@
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/USB-cdc-wdm-fix-buffer-overflow.patch]
 3.2-upstream-stable: released (3.2.41) [usb-cdc-wdm-fix-buffer-overflow.patch]
+3.2-wheezy-security: released (3.2.41-1)

Modified: active/CVE-2013-1928
===================================================================
--- active/CVE-2013-1928	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1928	2013-05-15 02:02:58 UTC (rev 2955)
@@ -8,4 +8,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.35-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/fs-compat_ioctl.c-VIDEO_SET_SPU_PALETTE-missing-erro.patch]
-3.2-upstream-stable: released (3.2.33)
+3.2-upstream-stable: released (3.2.33) [5bbeedc3110bbb1b5c6b01fc1f027ab5d2eb40d6]
+3.2-wheezy-security: released (3.2.35-1)

Modified: active/CVE-2013-1956
===================================================================
--- active/CVE-2013-1956	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1956	2013-05-15 02:02:58 UTC (rev 2955)
@@ -5,6 +5,6 @@
 upstream: released (3.9) [3151527ee007b73a0ebd296010f1c0454a919c7d]
 2.6.32-upstream-stable:
 sid: released (3.8.11-1)
-3.2-wheezy-security:
+3.2-wheezy-security: ignored (3.2.41-2+deb7u1) "need port"
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-1957
===================================================================
--- active/CVE-2013-1957	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-1957	2013-05-15 02:02:58 UTC (rev 2955)
@@ -5,6 +5,6 @@
 upstream: released (3.9) [90563b198e4c6674c63672fae1923da467215f45, 132c94e31b8bca8ea921f9f96a57d684fa4ae0a9]
 2.6.32-upstream-stable:
 sid: released (3.8.11-1)
-3.2-wheezy-security:
+3.2-wheezy-security: ignored (3.2.41-2+deb7u1) "need port"
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2013-2015
===================================================================
--- active/CVE-2013-2015	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-2015	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,6 +7,6 @@
 upstream: released (3.8) [0e9a9a1ad619e7e987815d20262d36a2f95717ca]
 2.6.32-upstream-stable:
 sid: released (3.8-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/ext4-make-orphan-functions-be-no-op-in-no-journal-mo.patch, bugfix/all/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ext4-make-orphan-functions-be-no-op-in-no-journal-mo.patch, bugfix/all/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch]
 3.2-upstream-stable:

Modified: active/CVE-2013-2634
===================================================================
--- active/CVE-2013-2634	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-2634	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,4 @@
 sid: released (3.2.41-1) [bugfix/all/dcbnl-fix-various-netlink-info-leaks.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/dcbnl-fix-various-netlink-info-leaks.patch]
 3.2-upstream-stable: released (3.2.42) [dcbnl-fix-various-netlink-info-leaks.patch]
-
+3.2-wheezy-security: released (3.2.41-1)

Modified: active/CVE-2013-3076
===================================================================
--- active/CVE-2013-3076	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3076	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: N/A "algif_hash not yet present"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [419f4ba0f032c8d906153d24e017f4bee6df26f5]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/crypto-algif-suppress-sending-source-address-informa.patch]

Modified: active/CVE-2013-3222
===================================================================
--- active/CVE-2013-3222	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3222	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,6 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/atm-update-msg_namelen-in-vcc_recvmsg.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [2a8c07b253bac436358adb9eb96a37dd223ef120]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/atm-update-msg_namelen-in-vcc_recvmsg.patch]
+

Modified: active/CVE-2013-3223
===================================================================
--- active/CVE-2013-3223	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3223	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [e72f86d5b6602c86efb08443c58086c40228b81b]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch]

Modified: active/CVE-2013-3224
===================================================================
--- active/CVE-2013-3224	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3224	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [95ee0fb7a014cdf80be37b329fa462ff3847f7c0]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch]

Modified: active/CVE-2013-3225
===================================================================
--- active/CVE-2013-3225	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3225	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [bbad6f725f1d1b92e5eb3a7c6a8875eeec955747]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch]

Modified: active/CVE-2013-3227
===================================================================
--- active/CVE-2013-3227	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3227	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: N/A "CAIF introduced in 2.6.35"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [5bf0d2c0fe1a954f937be4ad1b3c63b34e08dc52]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/caif-Fix-missing-msg_namelen-update-in-caif_seqpkt_r.patch]

Modified: active/CVE-2013-3228
===================================================================
--- active/CVE-2013-3228	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3228	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [402fb9f974f158d747e6c6944336cd9af7f349b2]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch]

Modified: active/CVE-2013-3229
===================================================================
--- active/CVE-2013-3229	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3229	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/iucv-Fix-missing-msg_namelen-update-in-iucv_sock_rec.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [40c157ba78681c45cc62dabde406b44ca3c76c2b]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/iucv-Fix-missing-msg_namelen-update-in-iucv_sock_rec.patch]

Modified: active/CVE-2013-3231
===================================================================
--- active/CVE-2013-3231	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3231	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [d0dd0a3d5d31807eea0d54bd561cf178c45a24ca]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch]

Modified: active/CVE-2013-3234
===================================================================
--- active/CVE-2013-3234	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3234	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [f05503a9ef115c505b36fcd75f77b341811e9169]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch]

Modified: active/CVE-2013-3235
===================================================================
--- active/CVE-2013-3235	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3235	2013-05-15 02:02:58 UTC (rev 2955)
@@ -7,4 +7,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/tipc-fix-info-leaks-via-msg_name-in-recv_msg-recv_st.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.45) [1ae38900523eaf11a77c73827c096d7e7eade3a4]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/tipc-fix-info-leaks-via-msg_name-in-recv_msg-recv_st.patch]

Modified: active/CVE-2013-3301
===================================================================
--- active/CVE-2013-3301	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3301	2013-05-15 02:02:58 UTC (rev 2955)
@@ -1,6 +1,5 @@
 Description:
 References:
- 
 Notes:
  jmm> Not activated in the Squeeze and Wheezy default configs
 Bugs:
@@ -9,4 +8,5 @@
 sid: released (3.8.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security:
-3.2-upstream-stable: released (3.2.44)
+3.2-upstream-stable: released (3.2.44) [ee3c9aabb636fcfc21d53c506362620b55fdd8c6]
+3.2-wheezy-security: pending (3.2.41-2+deb7u1) [bugfix/all/tracing-Fix-possible-NULL-pointer-dereferences.patch]

Modified: active/CVE-2013-3302
===================================================================
--- active/CVE-2013-3302	2013-05-14 19:27:33 UTC (rev 2954)
+++ active/CVE-2013-3302	2013-05-15 02:02:58 UTC (rev 2955)
@@ -6,6 +6,6 @@
 upstream: released (3.8) [ea702b80e0bbb2448e201472127288beb82ca2fe]
 2.6.32-upstream-stable: N/A
 sid:
-3.2-wheezy-security:
+3.2-wheezy-security: N/A
 2.6.32-squeeze-security: N/A
-3.2-upstream-stable:
+3.2-upstream-stable: N/A




More information about the kernel-sec-discuss mailing list