[kernel-sec-discuss] r2965 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Tue May 21 21:26:20 UTC 2013


Author: jmm
Date: 2013-05-21 21:25:58 +0000 (Tue, 21 May 2013)
New Revision: 2965

Modified:
   active/CVE-2012-3552
   active/CVE-2012-4461
   active/CVE-2012-4508
   active/CVE-2012-6537
   active/CVE-2012-6539
   active/CVE-2012-6540
   active/CVE-2012-6542
   active/CVE-2012-6544
   active/CVE-2012-6545
   active/CVE-2012-6546
   active/CVE-2012-6548
   active/CVE-2012-6549
   active/CVE-2013-0914
   active/CVE-2013-1767
   active/CVE-2013-1773
   active/CVE-2013-1774
   active/CVE-2013-1792
   active/CVE-2013-1796
   active/CVE-2013-1798
   active/CVE-2013-1826
   active/CVE-2013-1860
   active/CVE-2013-1928
   active/CVE-2013-2015
   active/CVE-2013-2634
   active/CVE-2013-3222
   active/CVE-2013-3223
   active/CVE-2013-3224
   active/CVE-2013-3225
   active/CVE-2013-3228
   active/CVE-2013-3229
   active/CVE-2013-3231
   active/CVE-2013-3234
   active/CVE-2013-3235
Log:
patches for 2.6.32.x


Modified: active/CVE-2012-3552
===================================================================
--- active/CVE-2012-3552	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-3552	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.0) [f6d8bd051c391c1c0458a30b2a7abcd939329259]
-2.6.32-upstream-stable: 
+2.6.32-upstream-stable: pending
 sid: released (3.0-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/inet-add-RCU-protection-to-inet-opt.patch]
 3.2-wheezy-security: N/A

Modified: active/CVE-2012-4461
===================================================================
--- active/CVE-2012-4461	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-4461	2013-05-21 21:25:58 UTC (rev 2965)
@@ -5,7 +5,7 @@
 Notes:
 Bugs:
 upstream: released (3.7-rc6) [6d1068b3a98519247d8ba4ec85cd40ac136dbdf9]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.35-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/x86/KVM-x86-invalid-opcode-oops-on-SET_SREGS-with-OSXSAV.patch]
 3.2-upstream-stable: released (3.2.36)

Modified: active/CVE-2012-4508
===================================================================
--- active/CVE-2012-4508	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-4508	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.7-rc2) [dee1f973ca341c266229faa5a1a5bb268bed3531g]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.35-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ext4-AIO-vs-fallocate-stale-data-exposure.patch]
 3.2-upstream-stable: released (3.2.33)

Modified: active/CVE-2012-6537
===================================================================
--- active/CVE-2012-6537	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-6537	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.6) [1f86840f897717f86d523a13e99a447e6a5d2fa5, 7b789836f434c87168eab067cfbed1ec4783dffd, f778a636713a435d3a922c60b1622a91136560c1]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.32-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/xfrm_user-fix-info-leak-in-copy_to_user_state.patch, bugfix/all/xfrm_user-fix-info-leak-in-copy_to_user_policy.patch, bugfix/all/xfrm_user-fix-info-leak-in-copy_to_user_tmpl.patch]
 3.2-upstream-stable: released (3.2.31) [e470a5bc5c80cad5d8877701784351c2d8cdb6bc, bc39fa8d3deb34d5d0cfd86aafb8033ac4a4ed90, 26d560eb8ee3e6dd505a5a8a43ff904c279f60ce]

Modified: active/CVE-2012-6539
===================================================================
--- active/CVE-2012-6539	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-6539	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.6) [43da5f2e0d0c69ded3d51907d9552310a6b545e8]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/net-fix-info-leak-in-compat-dev_ifconf.patch]
 3.2-upstream-stable: released (3.2.30) [daf8fa93325e55ec605c4e725e6dc07d63d0d5c1]

Modified: active/CVE-2012-6540
===================================================================
--- active/CVE-2012-6540	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-6540	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.6) [2d8a041b7bfe1097af21441cb77d6af95f4f4680]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ipvs-fix-info-leak-in-getsockopt-IP_VS_SO_GET_TIMEOU.patch]
 3.2-upstream-stable: released (3.2.30) [9b2a14018c8a62cf910e10efb4b24787549de5c4]

Modified: active/CVE-2012-6542
===================================================================
--- active/CVE-2012-6542	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-6542	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.6) [3592aaeb80290bda0f2cf0b5456c97bfc638b192]
-2.6.32-upstream-stable: 
+2.6.32-upstream-stable: pending
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/llc-fix-info-leak-via-getsockname.patch]
 3.2-upstream-stable: released (3.2.30) [3f497daadeeb2b84dc8e97b32416d98b34485b99]

Modified: active/CVE-2012-6544
===================================================================
--- active/CVE-2012-6544	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-6544	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.6) [792039c73cf176c8e39a6e8beef2c94ff46522ed, 3f68ba07b1da811bf383b4b701b129bfcb2e4988, e15ca9a0ef9a86f0477530b0f44a725d67f889ee]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/Bluetooth-L2CAP-Fix-info-leak-via-getsockname.patch, bugfix/all/Bluetooth-HCI-Fix-info-leak-in-getsockopt-HCI_FILTER.patch]
 3.2-upstream-stable: released (3.2.30) [79690021eba0738861965187af2f75035f846d6f, 1ec7005779d27fabc6fb64f0852745aaac4a66d2, 2c7571e8eccb318337c06e09871ce0bf9868b93a]

Modified: active/CVE-2012-6545
===================================================================
--- active/CVE-2012-6545	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-6545	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.6) [9344a972961d1a6d2c04d9008b13617bcb6ec2ef, f9432c5ec8b1e9a09b9b0e5569e3c73db8de432a, 9ad2de43f1aee7e7274a4e0d41465489299e344b]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/Bluetooth-RFCOMM-Fix-info-leak-via-getsockname.patch, bugfix/all/Bluetooth-RFCOMM-Fix-info-leak-in-ioctl-RFCOMMGETDEV.patch]
 3.2-upstream-stable: released (3.2.30) [18fc748c13b0a15152bd711c3d42560f833af9e5, 2ab341d741cb33f5e69893f6871cf4a4d7bfd3f5, 1621af48f4c2cf3e10438507bea36af7189603b9]

Modified: active/CVE-2012-6546
===================================================================
--- active/CVE-2012-6546	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-6546	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.6) [3c0c5cfdcd4d69ffc4b9c0907cec99039f30a50a, e862f1a9b7df4e8196ebec45ac62295138aa3fc2]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.30-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/atm-fix-info-leak-via-getsockname.patch, bugfix/all/atm-fix-info-leak-in-getsockopt-SO_ATMPVC.patch]
 3.2-upstream-stable: released (3.2.30) [86cbb1ef4f7b1e6ac6cb65bb34b6949cd5b90c6e, 3d9e0c7f9adf3b5bbdc257d4c70ead09947cc304]

Modified: active/CVE-2012-6548
===================================================================
--- active/CVE-2012-6548	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-6548	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.6) [0143fc5e9f6f5aad4764801015bc8d4b4a278200]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/udf-avoid-info-leak-on-export.patch]
 3.2-upstream-stable: released (3.2.42)

Modified: active/CVE-2012-6549
===================================================================
--- active/CVE-2012-6549	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2012-6549	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.6) [fe685aabf7c8c9f138e5ea900954d295bf229175]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/isofs-avoid-info-leak-on-export.patch]
 3.2-upstream-stable: released (3.2.42)

Modified: active/CVE-2013-0914
===================================================================
--- active/CVE-2013-0914	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-0914	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.9-rc3) [2ca39528c01a933f6689cd6505ce65bd6d68a530]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/signal-always-clear-sa_restorer-on-execve.patch, bugfix/all/signal-Define-__ARCH_HAS_SA_RESTORER-so-we-know-whet.patch, bugfix/all/kernel-signal.c-use-__ARCH_HAS_SA_RESTORER-instead-o.patch]
 3.2-upstream-stable: released (3.2.41) [signal-always-clear-sa_restorer-on-execve.patch]

Modified: active/CVE-2013-1767
===================================================================
--- active/CVE-2013-1767	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-1767	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.9-rc1) [5f00110f7273f9ff04ac69a5f85bb535a4fd0987]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/tmpfs-fix-use-after-free-of-mempolicy-object.patch]
 3.2-upstream-stable: released (3.2.40)

Modified: active/CVE-2013-1773
===================================================================
--- active/CVE-2013-1773	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-1773	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.3) [0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.15-1) [features/x86/hyperv/0001-NLS-improve-UTF8-UTF16-string-conversion-routine.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/fat-Fix-stat-f_namelen.patch, bugfix/all/NLS-improve-UTF8-UTF16-string-conversion-routine.patch, debian/nls-Avoid-ABI-change-for-CVE-2013-1773-fix.patch]
 3.2-upstream-stable: released (3.2.41) [6022b67230dcb25c267e832d72223ffb54703cc8]

Modified: active/CVE-2013-1774
===================================================================
--- active/CVE-2013-1774	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-1774	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.8) [1ee0a224bc9aad1de496c795f96bc6ba2c394811]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.2.38-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/USB-io_ti-Fix-Null-dereference-in-chase-port.patch]
 3.2-upstream-stable: released (3.2.38) [7b4992729ddd232f6026c109f93d8296ca58b3ed]

Modified: active/CVE-2013-1792
===================================================================
--- active/CVE-2013-1792	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-1792	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.9-rc3) [0da9dfdd2cd9889201bc6f6f43580c99165cd087]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/keys-fix-race-with-concurrent-install_user_keyrings.patch]
 3.2-upstream-stable: released (3.2.41) [keys-fix-race-with-concurrent-install_user_keyrings.patch]

Modified: active/CVE-2013-1796
===================================================================
--- active/CVE-2013-1796	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-1796	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9-rc3) [c300aa64ddf57d9c5d9c898a64b36877345dd4a9]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.41-2) [bugfix/x86/KVM-x86-fix-for-buffer-overflow-in-handling-of-MSR_K.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/x86/KVM-x86-fix-for-buffer-overflow-in-handling-of-MSR_K.patch, bugfix/x86/KVM-x86-relax-MSR_KVM_SYSTEM_TIME-alignment-check.patch]
 3.2-upstream-stable: released (3.2.44)

Modified: active/CVE-2013-1798
===================================================================
--- active/CVE-2013-1798	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-1798	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9-rc3) [a2c118bfab8bc6b8bb213abfc35201e441693d55]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.2.41-2) [bugfix/all/KVM-Fix-bounds-checking-in-ioapic-indirect-register-.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/KVM-Fix-bounds-checking-in-ioapic-indirect-register-.patch]
 3.2-upstream-stable: released (3.2.44)

Modified: active/CVE-2013-1826
===================================================================
--- active/CVE-2013-1826	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-1826	2013-05-21 21:25:58 UTC (rev 2965)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.6) [864745d291b5ba80ea0bd0edcbe67273de368836, c25463722509fef0ed630b271576a8c9a70236f3]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.2.32-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/xfrm_user-return-error-pointer-instead-of-NULL.patch, bugfix/all/xfrm_user-return-error-pointer-instead-of-NULL-2.patch]
 3.2-upstream-stable: released (3.2.31) [468bf9f70353872173b11b92dc15fe84d3dacbb4, 61819032c7d98c35d2f475032f3c9e30948feaf4]

Modified: active/CVE-2013-1860
===================================================================
--- active/CVE-2013-1860	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-1860	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9-rc3) [c0f5ecee4e741667b2493c742b60b6218d40b3aa]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.2.41-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/USB-cdc-wdm-fix-buffer-overflow.patch]
 3.2-upstream-stable: released (3.2.41) [usb-cdc-wdm-fix-buffer-overflow.patch]

Modified: active/CVE-2013-1928
===================================================================
--- active/CVE-2013-1928	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-1928	2013-05-21 21:25:58 UTC (rev 2965)
@@ -5,7 +5,7 @@
 Notes:
 Bugs:
 upstream: released (3.7-rc3) [12176503366885edd542389eed3aaf94be163fdb]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.2.35-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/fs-compat_ioctl.c-VIDEO_SET_SPU_PALETTE-missing-erro.patch]
 3.2-upstream-stable: released (3.2.33) [5bbeedc3110bbb1b5c6b01fc1f027ab5d2eb40d6]

Modified: active/CVE-2013-2015
===================================================================
--- active/CVE-2013-2015	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-2015	2013-05-21 21:25:58 UTC (rev 2965)
@@ -5,7 +5,7 @@
  dannf> Verified that reproducer hangs on 2.6.32
 Bugs:
 upstream: released (3.8) [0e9a9a1ad619e7e987815d20262d36a2f95717ca]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.8-1)
 3.2-wheezy-security: released (3.2.41-2+deb7u1) [bugfix/all/ext4-make-orphan-functions-be-no-op-in-no-journal-mo.patch, bugfix/all/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ext4-make-orphan-functions-be-no-op-in-no-journal-mo.patch, bugfix/all/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch]

Modified: active/CVE-2013-2634
===================================================================
--- active/CVE-2013-2634	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-2634	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9-rc3) [29cd8ae0e1a39e239a3a7b67da1986add1199fc0]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.2.41-1) [bugfix/all/dcbnl-fix-various-netlink-info-leaks.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/dcbnl-fix-various-netlink-info-leaks.patch]
 3.2-upstream-stable: released (3.2.42) [dcbnl-fix-various-netlink-info-leaks.patch]

Modified: active/CVE-2013-3222
===================================================================
--- active/CVE-2013-3222	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-3222	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9) [9b3e617f3df53822345a8573b6d358f6b9e5ed87]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.8.11-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/atm-update-msg_namelen-in-vcc_recvmsg.patch]
 3.2-upstream-stable: released (3.2.45) [2a8c07b253bac436358adb9eb96a37dd223ef120]

Modified: active/CVE-2013-3223
===================================================================
--- active/CVE-2013-3223	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-3223	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9) [ef3313e84acbf349caecae942ab3ab731471f1a1]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.8.11-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ax25-fix-info-leak-via-msg_name-in-ax25_recvmsg.patch]
 3.2-upstream-stable: released (3.2.45) [e72f86d5b6602c86efb08443c58086c40228b81b]

Modified: active/CVE-2013-3224
===================================================================
--- active/CVE-2013-3224	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-3224	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9) [4683f42fde3977bdb4e8a09622788cc8b5313778]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.8.11-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/Bluetooth-fix-possible-info-leak-in-bt_sock_recvmsg.patch]
 3.2-upstream-stable: released (3.2.45) [95ee0fb7a014cdf80be37b329fa462ff3847f7c0]

Modified: active/CVE-2013-3225
===================================================================
--- active/CVE-2013-3225	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-3225	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9) [e11e0455c0d7d3d62276a0c55d9dfbc16779d691]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.8.11-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/Bluetooth-RFCOMM-Fix-missing-msg_namelen-update-in-r.patch]
 3.2-upstream-stable: released (3.2.45) [bbad6f725f1d1b92e5eb3a7c6a8875eeec955747]

Modified: active/CVE-2013-3228
===================================================================
--- active/CVE-2013-3228	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-3228	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,9 +3,8 @@
 Notes:
 Bugs:
 upstream: released (3.9) [5ae94c0d2f0bed41d6718be743985d61b7f5c47d]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.8.11-1)
-3.2-wheezy-security:
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch]
 3.2-upstream-stable: released (3.2.45) [402fb9f974f158d747e6c6944336cd9af7f349b2]
 3.2-wheezy-security: released (3.2.41-2+deb7u1) [bugfix/all/irda-Fix-missing-msg_namelen-update-in-irda_recvmsg_.patch]

Modified: active/CVE-2013-3229
===================================================================
--- active/CVE-2013-3229	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-3229	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9) [a5598bd9c087dc0efc250a5221e5d0e6f584ee88]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.8.11-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/iucv-Fix-missing-msg_namelen-update-in-iucv_sock_rec.patch]
 3.2-upstream-stable: released (3.2.45) [40c157ba78681c45cc62dabde406b44ca3c76c2b]

Modified: active/CVE-2013-3231
===================================================================
--- active/CVE-2013-3231	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-3231	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9) [c77a4b9cffb6215a15196ec499490d116dfad181]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.8.11-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/llc-Fix-missing-msg_namelen-update-in-llc_ui_recvmsg.patch]
 3.2-upstream-stable: released (3.2.45) [d0dd0a3d5d31807eea0d54bd561cf178c45a24ca]

Modified: active/CVE-2013-3234
===================================================================
--- active/CVE-2013-3234	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-3234	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9) [4a184233f21645cf0b719366210ed445d1024d72]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.8.11-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/rose-fix-info-leak-via-msg_name-in-rose_recvmsg.patch]
 3.2-upstream-stable: released (3.2.45) [f05503a9ef115c505b36fcd75f77b341811e9169]

Modified: active/CVE-2013-3235
===================================================================
--- active/CVE-2013-3235	2013-05-16 09:36:28 UTC (rev 2964)
+++ active/CVE-2013-3235	2013-05-21 21:25:58 UTC (rev 2965)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.9) [60085c3d009b0df252547adb336d1ccca5ce52ec]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.8.11-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/tipc-fix-info-leaks-via-msg_name-in-recv_msg-recv_st.patch]
 3.2-upstream-stable: released (3.2.45) [1ae38900523eaf11a77c73827c096d7e7eade3a4]




More information about the kernel-sec-discuss mailing list