[kernel-sec-discuss] r3094 - active

Dann Frazier dannf at alioth.debian.org
Sun Sep 22 22:08:56 UTC 2013


Author: dannf
Date: 2013-09-22 22:08:35 +0000 (Sun, 22 Sep 2013)
New Revision: 3094

Modified:
   active/CVE-2013-2141
   active/CVE-2013-2164
   active/CVE-2013-2206
   active/CVE-2013-2232
   active/CVE-2013-2234
   active/CVE-2013-2237
   active/CVE-2013-2239
   active/CVE-2013-2851
   active/CVE-2013-2852
   active/CVE-2013-2888
Log:
add patch references

Modified: active/CVE-2013-2141
===================================================================
--- active/CVE-2013-2141	2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2141	2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: released (2.6.32.61)
 sid: released (3.9.4-1)
 3.2-wheezy-security: released (3.2.41-2+deb7u1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/signal-stop-infoleak-via-tkill-and-tgkill-signals.patch]
 3.2-upstream-stable: released (3.2.44)

Modified: active/CVE-2013-2164
===================================================================
--- active/CVE-2013-2164	2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2164	2013-09-22 22:08:35 UTC (rev 3094)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.9.8-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/drivers-cdrom-cdrom.c-use-kzalloc-for-failing-hardwa.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/cdrom-use-kzalloc-for-failing-hw.patch]
 3.2-upstream-stable: released (3.2.49)

Modified: active/CVE-2013-2206
===================================================================
--- active/CVE-2013-2206	2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2206	2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.9.4-1)
 3.2-wheezy-security: released (3.2.46-1
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/sctp-duplicate-cookie-handling-null-pointer-deref.patch]
 3.2-upstream-stable: released (3.2.42)

Modified: active/CVE-2013-2232
===================================================================
--- active/CVE-2013-2232	2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2232	2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable:
 sid: released (3.10.1-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/ipv6-ipv6_sk_dst_check_must-not-assume-ipv6-dst.patch]
 3.2-upstream-stable: released (3.2.50)

Modified: active/CVE-2013-2234
===================================================================
--- active/CVE-2013-2234	2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2234	2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.10.1-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/af_key-fix-info-leaks-in-notify-messages.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/af_key-fix-info-leaks-in-notify-msgs.patch]
 3.2-upstream-stable: released (3.2.50)

Modified: active/CVE-2013-2237
===================================================================
--- active/CVE-2013-2237	2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2237	2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.9.4-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/af_key-initialize-satype-in-key_notify_policy_flush.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/af_key-initialize-sa_type-in-key_notify_policy_flush.patch]
 3.2-upstream-stable: released (3.2.51)

Modified: active/CVE-2013-2239
===================================================================
--- active/CVE-2013-2239	2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2239	2013-09-22 22:08:35 UTC (rev 3094)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: N/A "openvz not upstream"
 sid: N/A "openvz no longer included"
 3.2-wheezy-security: N/A "openvz no longer included"
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [features/all/openvz/CVE-2013-2239.patch]
 3.2-upstream-stable: N/A "openvz not upstream"

Modified: active/CVE-2013-2851
===================================================================
--- active/CVE-2013-2851	2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2851	2013-09-22 22:08:35 UTC (rev 3094)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.9.8-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/block-do-not-pass-disk-names-as-format-strings.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/block-do-not-pass-disknames-as-formatstrings.patch]
 3.2-upstream-stable: released (3.2.49)

Modified: active/CVE-2013-2852
===================================================================
--- active/CVE-2013-2852	2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2852	2013-09-22 22:08:35 UTC (rev 3094)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.9.8-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/b43-stop-format-string-leaking-into-error-msgs.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/b43-stop-formatstring-leak.patch]
 3.2-upstream-stable: released (3.2.47)

Modified: active/CVE-2013-2888
===================================================================
--- active/CVE-2013-2888	2013-09-22 21:11:59 UTC (rev 3093)
+++ active/CVE-2013-2888	2013-09-22 22:08:35 UTC (rev 3094)
@@ -9,5 +9,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.10.11-1)
 3.2-wheezy-security: needed
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/hid-check-for-null-when-setting-values.patch, bugfix/all/hid-validate-report-id-size.patch]
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list