[kernel-sec-discuss] r3100 - active
Moritz Muehlenhoff
jmm at alioth.debian.org
Mon Sep 30 05:21:35 UTC 2013
Author: jmm
Date: 2013-09-30 05:21:13 +0000 (Mon, 30 Sep 2013)
New Revision: 3100
Modified:
active/CVE-2013-2141
active/CVE-2013-2206
active/CVE-2013-2232
active/CVE-2013-2234
active/CVE-2013-2237
active/CVE-2013-2239
active/CVE-2013-2851
active/CVE-2013-2852
active/CVE-2013-2888
active/CVE-2013-2892
Log:
oldstable DSA released
Modified: active/CVE-2013-2141
===================================================================
--- active/CVE-2013-2141 2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2141 2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: released (2.6.32.61)
sid: released (3.9.4-1)
3.2-wheezy-security: released (3.2.41-2+deb7u1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/signal-stop-infoleak-via-tkill-and-tgkill-signals.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/signal-stop-infoleak-via-tkill-and-tgkill-signals.patch]
3.2-upstream-stable: released (3.2.44)
Modified: active/CVE-2013-2206
===================================================================
--- active/CVE-2013-2206 2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2206 2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.9.4-1)
3.2-wheezy-security: released (3.2.46-1
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/sctp-duplicate-cookie-handling-null-pointer-deref.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/sctp-duplicate-cookie-handling-null-pointer-deref.patch]
3.2-upstream-stable: released (3.2.42)
Modified: active/CVE-2013-2232
===================================================================
--- active/CVE-2013-2232 2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2232 2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable:
sid: released (3.10.1-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/ipv6-ipv6_sk_dst_check_must-not-assume-ipv6-dst.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/ipv6-ipv6_sk_dst_check_must-not-assume-ipv6-dst.patch]
3.2-upstream-stable: released (3.2.50)
Modified: active/CVE-2013-2234
===================================================================
--- active/CVE-2013-2234 2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2234 2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.10.1-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/af_key-fix-info-leaks-in-notify-messages.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/af_key-fix-info-leaks-in-notify-msgs.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/af_key-fix-info-leaks-in-notify-msgs.patch]
3.2-upstream-stable: released (3.2.50)
Modified: active/CVE-2013-2237
===================================================================
--- active/CVE-2013-2237 2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2237 2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.9.4-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/af_key-initialize-satype-in-key_notify_policy_flush.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/af_key-initialize-sa_type-in-key_notify_policy_flush.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/af_key-initialize-sa_type-in-key_notify_policy_flush.patch]
3.2-upstream-stable: released (3.2.51)
Modified: active/CVE-2013-2239
===================================================================
--- active/CVE-2013-2239 2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2239 2013-09-30 05:21:13 UTC (rev 3100)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: N/A "openvz not upstream"
sid: N/A "openvz no longer included"
3.2-wheezy-security: N/A "openvz no longer included"
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [features/all/openvz/CVE-2013-2239.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [features/all/openvz/CVE-2013-2239.patch]
3.2-upstream-stable: N/A "openvz not upstream"
Modified: active/CVE-2013-2851
===================================================================
--- active/CVE-2013-2851 2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2851 2013-09-30 05:21:13 UTC (rev 3100)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: needed
sid: released (3.9.8-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/block-do-not-pass-disk-names-as-format-strings.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/block-do-not-pass-disknames-as-formatstrings.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/block-do-not-pass-disknames-as-formatstrings.patch]
3.2-upstream-stable: released (3.2.49)
Modified: active/CVE-2013-2852
===================================================================
--- active/CVE-2013-2852 2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2852 2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.9.8-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/b43-stop-format-string-leaking-into-error-msgs.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/b43-stop-formatstring-leak.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/b43-stop-formatstring-leak.patch]
3.2-upstream-stable: released (3.2.47)
Modified: active/CVE-2013-2888
===================================================================
--- active/CVE-2013-2888 2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2888 2013-09-30 05:21:13 UTC (rev 3100)
@@ -8,6 +8,6 @@
upstream: released (3.12-rc1) [43622021d2e2b82ea03d883926605bdd0525e1d1, be67b68d52fa28b9b721c47bb42068f0c1214855]
2.6.32-upstream-stable: needed
sid: released (3.10.11-1)
-3.2-wheezy-security: pending (3.2.51-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/hid-check-for-null-when-setting-values.patch, bugfix/all/hid-validate-report-id-size.patch]
+3.2-wheezy-security: released (3.2.51-1)
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/hid-check-for-null-when-setting-values.patch, bugfix/all/hid-validate-report-id-size.patch]
3.2-upstream-stable: needed
Modified: active/CVE-2013-2892
===================================================================
--- active/CVE-2013-2892 2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2892 2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,6 +6,6 @@
upstream: released (3.12-rc1) [412f30105ec6735224535791eed5cdc02888ecb4]
2.6.32-upstream-stable: needed
sid: released (3.10.11-1)
-3.2-wheezy-security: pending (3.2.51-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/HID-pantherlord-validate-output-report-details.patch]
+3.2-wheezy-security: released (3.2.51-1)
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/HID-pantherlord-validate-output-report-details.patch]
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list