[kernel-sec-discuss] r3125 - active retired

Moritz Muehlenhoff jmm at alioth.debian.org
Tue Oct 22 04:44:41 UTC 2013


Author: jmm
Date: 2013-10-22 04:44:19 +0000 (Tue, 22 Oct 2013)
New Revision: 3125

Modified:
   active/CVE-2013-0343
   active/CVE-2013-2147
   active/CVE-2013-2888
   active/CVE-2013-2889
   active/CVE-2013-2892
   active/CVE-2013-2893
   active/CVE-2013-2895
   active/CVE-2013-2896
   active/CVE-2013-2897
   active/CVE-2013-2899
   active/CVE-2013-4350
   active/CVE-2013-4387
   retired/CVE-2013-2015
Log:
pending fixes for 3.2.52


Modified: active/CVE-2013-0343
===================================================================
--- active/CVE-2013-0343	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-0343	2013-10-22 04:44:19 UTC (rev 3125)
@@ -10,4 +10,4 @@
 sid: released (3.10.11-1)
 3.2-wheezy-security: released (3.2.51-1)
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-2147
===================================================================
--- active/CVE-2013-2147	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-2147	2013-10-22 04:44:19 UTC (rev 3125)
@@ -9,4 +9,4 @@
 sid: released (3.11.5-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-2888
===================================================================
--- active/CVE-2013-2888	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-2888	2013-10-22 04:44:19 UTC (rev 3125)
@@ -10,4 +10,4 @@
 sid: released (3.10.11-1)
 3.2-wheezy-security: released (3.2.51-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/hid-check-for-null-when-setting-values.patch, bugfix/all/hid-validate-report-id-size.patch]
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-2889
===================================================================
--- active/CVE-2013-2889	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-2889	2013-10-22 04:44:19 UTC (rev 3125)
@@ -9,4 +9,4 @@
 sid: released (3.11.5-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-2892
===================================================================
--- active/CVE-2013-2892	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-2892	2013-10-22 04:44:19 UTC (rev 3125)
@@ -8,4 +8,4 @@
 sid: released (3.10.11-1)
 3.2-wheezy-security: released (3.2.51-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/HID-pantherlord-validate-output-report-details.patch]
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-2893
===================================================================
--- active/CVE-2013-2893	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-2893	2013-10-22 04:44:19 UTC (rev 3125)
@@ -9,4 +9,4 @@
 sid: released (3.11.5-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-2895
===================================================================
--- active/CVE-2013-2895	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-2895	2013-10-22 04:44:19 UTC (rev 3125)
@@ -9,4 +9,4 @@
 sid: released (3.11.5-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: N/A "Introduced in 3.2 with 534a7b8e10ec55d9f521e68c20dbb3634c25b98a"
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-2896
===================================================================
--- active/CVE-2013-2896	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-2896	2013-10-22 04:44:19 UTC (rev 3125)
@@ -8,4 +8,4 @@
 sid: released (3.10.11-1)
 3.2-wheezy-security: released (3.2.51-1)
 2.6.32-squeeze-security: N/A "Vulnerable code not present"
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-2897
===================================================================
--- active/CVE-2013-2897	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-2897	2013-10-22 04:44:19 UTC (rev 3125)
@@ -8,4 +8,4 @@
 sid: released (3.11.5-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 5519cab477b61326963c8d523520db0342862b63"
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-2899
===================================================================
--- active/CVE-2013-2899	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-2899	2013-10-22 04:44:19 UTC (rev 3125)
@@ -9,4 +9,4 @@
 sid: released (3.10.11-1)
 3.2-wheezy-security: released (3.2.51-1)
 2.6.32-squeeze-security: N/A "Introduced in 2.6.35 with 236db47c2b3b69464d50c695ab2ddd516cf64520"
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-4350
===================================================================
--- active/CVE-2013-4350	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-4350	2013-10-22 04:44:19 UTC (rev 3125)
@@ -1,6 +1,5 @@
 Description: net: sctp: fix ipv6 ipsec encryption bug in sctp_v6_xmit
 References:
- http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=95ee62083cb6453e056562d91f597552021e6ae7
 Notes:
 Bugs:
 upstream: released (3.12-rc2) [95ee62083cb6453e056562d91f597552021e6ae7]
@@ -8,4 +7,4 @@
 sid: released (3.11.5-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: active/CVE-2013-4387
===================================================================
--- active/CVE-2013-4387	2013-10-21 05:22:28 UTC (rev 3124)
+++ active/CVE-2013-4387	2013-10-22 04:44:19 UTC (rev 3125)
@@ -1,6 +1,5 @@
 Description: linux kernel memory corruption with ipv6 udp offloading
 References:
- https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=2811ebac2521ceac84f2bdae402455baa6a7fb47
 Notes:
 Bugs:
 upstream: released (3.12-rc3) [2811ebac2521ceac84f2bdae402455baa6a7fb47]
@@ -8,4 +7,4 @@
 sid: released (3.11.5-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.52)

Modified: retired/CVE-2013-2015
===================================================================
--- retired/CVE-2013-2015	2013-10-21 05:22:28 UTC (rev 3124)
+++ retired/CVE-2013-2015	2013-10-22 04:44:19 UTC (rev 3125)
@@ -9,4 +9,4 @@
 sid: released (3.8-1)
 3.2-wheezy-security: released (3.2.41-2+deb7u1) [bugfix/all/ext4-make-orphan-functions-be-no-op-in-no-journal-mo.patch, bugfix/all/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ext4-make-orphan-functions-be-no-op-in-no-journal-mo.patch, bugfix/all/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: pending (3.2.52)




More information about the kernel-sec-discuss mailing list