[kernel-sec-discuss] r3086 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Wed Sep 11 07:45:35 UTC 2013


Author: jmm
Date: 2013-09-11 07:45:06 +0000 (Wed, 11 Sep 2013)
New Revision: 3086

Modified:
   active/CVE-2013-0343
   active/CVE-2013-2239
   active/CVE-2013-2888
   active/CVE-2013-2892
   active/CVE-2013-2896
   active/CVE-2013-2898
   active/CVE-2013-2899
   active/CVE-2013-4254
Log:
fixes from sid


Modified: active/CVE-2013-0343
===================================================================
--- active/CVE-2013-0343	2013-09-10 04:09:31 UTC (rev 3085)
+++ active/CVE-2013-0343	2013-09-11 07:45:06 UTC (rev 3086)
@@ -7,7 +7,7 @@
 Bugs:
 upstream: released (3.11) [4b08a8f1bd8cb4541c93ec170027b4d0782dab52]
 2.6.32-upstream-stable: needed
-sid: pending (3.10.11-1)
+sid: released (3.10.11-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-2239
===================================================================
--- active/CVE-2013-2239	2013-09-10 04:09:31 UTC (rev 3085)
+++ active/CVE-2013-2239	2013-09-11 07:45:06 UTC (rev 3086)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: N/A "openvz not upstream"
 sid: N/A "openvz no longer included"
 3.2-wheezy-security: N/A "openvz no longer included"
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
 3.2-upstream-stable: N/A "openvz not upstream"

Modified: active/CVE-2013-2888
===================================================================
--- active/CVE-2013-2888	2013-09-10 04:09:31 UTC (rev 3085)
+++ active/CVE-2013-2888	2013-09-11 07:45:06 UTC (rev 3086)
@@ -7,7 +7,7 @@
 Bugs:
 upstream: pending [43622021d2e2b82ea03d883926605bdd0525e1d1, be67b68d52fa28b9b721c47bb42068f0c1214855]
 2.6.32-upstream-stable: needed
-sid: pending (3.10.11-1)
+sid: released (3.10.11-1)
 3.2-wheezy-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
 3.2-upstream-stable: needed

Modified: active/CVE-2013-2892
===================================================================
--- active/CVE-2013-2892	2013-09-10 04:09:31 UTC (rev 3085)
+++ active/CVE-2013-2892	2013-09-11 07:45:06 UTC (rev 3086)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: pending [412f30105ec6735224535791eed5cdc02888ecb4]
 2.6.32-upstream-stable: needed
-sid: pending (3.10.11-1)
+sid: released (3.10.11-1)
 3.2-wheezy-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
 3.2-upstream-stable: needed

Modified: active/CVE-2013-2896
===================================================================
--- active/CVE-2013-2896	2013-09-10 04:09:31 UTC (rev 3085)
+++ active/CVE-2013-2896	2013-09-11 07:45:06 UTC (rev 3086)
@@ -4,8 +4,8 @@
 Notes:
 Bugs:
 upstream: pending [875b4e3763dbc941f15143dd1a18d10bb0be303b]
-2.6.32-upstream-stable: needed
-sid: pending (3.10.11-1)
+2.6.32-upstream-stable: N/A "Vulnerable code not present"
+sid: released (3.10.11-1)
 3.2-wheezy-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: N/A "Vulnerable code not present"
 3.2-upstream-stable: needed

Modified: active/CVE-2013-2898
===================================================================
--- active/CVE-2013-2898	2013-09-10 04:09:31 UTC (rev 3085)
+++ active/CVE-2013-2898	2013-09-11 07:45:06 UTC (rev 3086)
@@ -3,9 +3,9 @@
  http://marc.info/?l=linux-input&m=137772191114645&w=1
 Notes:
 Bugs:
-upstream: pending [9e8910257397372633e74b333ef891f20c800ee4]
+upstream: released (3.12-rc1) [9e8910257397372633e74b333ef891f20c800ee4]
 2.6.32-upstream-stable: N/A "Introduced in 3.7 with 401ca24fb34aee0cedf9c4fef361e533224f15a1"
-sid: pending (3.10.11-1)
+sid: released (3.10.11-1)
 3.2-wheezy-security: N/A "Introduced in 3.7 with 401ca24fb34aee0cedf9c4fef361e533224f15a1"
 2.6.32-squeeze-security: N/A "Introduced in 3.7 with 401ca24fb34aee0cedf9c4fef361e533224f15a1"
 3.2-upstream-stable: N/A "Introduced in 3.7 with 401ca24fb34aee0cedf9c4fef361e533224f15a1"

Modified: active/CVE-2013-2899
===================================================================
--- active/CVE-2013-2899	2013-09-10 04:09:31 UTC (rev 3085)
+++ active/CVE-2013-2899	2013-09-11 07:45:06 UTC (rev 3086)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: pending [1e87a2456b0227ca4ab881e19a11bb99d164e792]
 2.6.32-upstream-stable: N/A "Introduced in 2.6.35 with 236db47c2b3b69464d50c695ab2ddd516cf64520"
-sid: pending (3.10.11-1)
+sid: released (3.10.11-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: N/A "Introduced in 2.6.35 with 236db47c2b3b69464d50c695ab2ddd516cf64520"
 3.2-upstream-stable: needed

Modified: active/CVE-2013-4254
===================================================================
--- active/CVE-2013-4254	2013-09-10 04:09:31 UTC (rev 3085)
+++ active/CVE-2013-4254	2013-09-11 07:45:06 UTC (rev 3086)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (3.11-rc6) [c95eb3184ea1a3a2551df57190c81da695e2144b]
 2.6.32-upstream-stable: N/A "No perf support for arm"
-sid: pending (3.10.11-1)
+sid: released (3.10.11-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security: N/A "No perf support for arm"
 3.2-upstream-stable:




More information about the kernel-sec-discuss mailing list