[kernel-sec-discuss] r3094 - active
Dann Frazier
dannf at alioth.debian.org
Sun Sep 22 22:08:56 UTC 2013
Author: dannf
Date: 2013-09-22 22:08:35 +0000 (Sun, 22 Sep 2013)
New Revision: 3094
Modified:
active/CVE-2013-2141
active/CVE-2013-2164
active/CVE-2013-2206
active/CVE-2013-2232
active/CVE-2013-2234
active/CVE-2013-2237
active/CVE-2013-2239
active/CVE-2013-2851
active/CVE-2013-2852
active/CVE-2013-2888
Log:
add patch references
Modified: active/CVE-2013-2141
===================================================================
--- active/CVE-2013-2141 2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2141 2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: released (2.6.32.61)
sid: released (3.9.4-1)
3.2-wheezy-security: released (3.2.41-2+deb7u1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/signal-stop-infoleak-via-tkill-and-tgkill-signals.patch]
3.2-upstream-stable: released (3.2.44)
Modified: active/CVE-2013-2164
===================================================================
--- active/CVE-2013-2164 2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2164 2013-09-22 22:08:35 UTC (rev 3094)
@@ -8,5 +8,5 @@
2.6.32-upstream-stable: needed
sid: released (3.9.8-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/drivers-cdrom-cdrom.c-use-kzalloc-for-failing-hardwa.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/cdrom-use-kzalloc-for-failing-hw.patch]
3.2-upstream-stable: released (3.2.49)
Modified: active/CVE-2013-2206
===================================================================
--- active/CVE-2013-2206 2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2206 2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.9.4-1)
3.2-wheezy-security: released (3.2.46-1
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/sctp-duplicate-cookie-handling-null-pointer-deref.patch]
3.2-upstream-stable: released (3.2.42)
Modified: active/CVE-2013-2232
===================================================================
--- active/CVE-2013-2232 2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2232 2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable:
sid: released (3.10.1-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/ipv6-ipv6_sk_dst_check_must-not-assume-ipv6-dst.patch]
3.2-upstream-stable: released (3.2.50)
Modified: active/CVE-2013-2234
===================================================================
--- active/CVE-2013-2234 2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2234 2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.10.1-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/af_key-fix-info-leaks-in-notify-messages.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/af_key-fix-info-leaks-in-notify-msgs.patch]
3.2-upstream-stable: released (3.2.50)
Modified: active/CVE-2013-2237
===================================================================
--- active/CVE-2013-2237 2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2237 2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.9.4-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/af_key-initialize-satype-in-key_notify_policy_flush.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/af_key-initialize-sa_type-in-key_notify_policy_flush.patch]
3.2-upstream-stable: released (3.2.51)
Modified: active/CVE-2013-2239
===================================================================
--- active/CVE-2013-2239 2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2239 2013-09-22 22:08:35 UTC (rev 3094)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: N/A "openvz not upstream"
sid: N/A "openvz no longer included"
3.2-wheezy-security: N/A "openvz no longer included"
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [features/all/openvz/CVE-2013-2239.patch]
3.2-upstream-stable: N/A "openvz not upstream"
Modified: active/CVE-2013-2851
===================================================================
--- active/CVE-2013-2851 2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2851 2013-09-22 22:08:35 UTC (rev 3094)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: needed
sid: released (3.9.8-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/block-do-not-pass-disk-names-as-format-strings.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/block-do-not-pass-disknames-as-formatstrings.patch]
3.2-upstream-stable: released (3.2.49)
Modified: active/CVE-2013-2852
===================================================================
--- active/CVE-2013-2852 2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2852 2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.9.8-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/b43-stop-format-string-leaking-into-error-msgs.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/b43-stop-formatstring-leak.patch]
3.2-upstream-stable: released (3.2.47)
Modified: active/CVE-2013-2888
===================================================================
--- active/CVE-2013-2888 2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2888 2013-09-22 22:08:35 UTC (rev 3094)
@@ -9,5 +9,5 @@
2.6.32-upstream-stable: needed
sid: released (3.10.11-1)
3.2-wheezy-security: needed
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/hid-check-for-null-when-setting-values.patch, bugfix/all/hid-validate-report-id-size.patch]
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list