[kernel-sec-discuss] r3100 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Sep 30 05:21:35 UTC 2013


Author: jmm
Date: 2013-09-30 05:21:13 +0000 (Mon, 30 Sep 2013)
New Revision: 3100

Modified:
   active/CVE-2013-2141
   active/CVE-2013-2206
   active/CVE-2013-2232
   active/CVE-2013-2234
   active/CVE-2013-2237
   active/CVE-2013-2239
   active/CVE-2013-2851
   active/CVE-2013-2852
   active/CVE-2013-2888
   active/CVE-2013-2892
Log:
oldstable DSA released


Modified: active/CVE-2013-2141
===================================================================
--- active/CVE-2013-2141	2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2141	2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: released (2.6.32.61)
 sid: released (3.9.4-1)
 3.2-wheezy-security: released (3.2.41-2+deb7u1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/signal-stop-infoleak-via-tkill-and-tgkill-signals.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/signal-stop-infoleak-via-tkill-and-tgkill-signals.patch]
 3.2-upstream-stable: released (3.2.44)

Modified: active/CVE-2013-2206
===================================================================
--- active/CVE-2013-2206	2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2206	2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.9.4-1)
 3.2-wheezy-security: released (3.2.46-1
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/sctp-duplicate-cookie-handling-null-pointer-deref.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/sctp-duplicate-cookie-handling-null-pointer-deref.patch]
 3.2-upstream-stable: released (3.2.42)

Modified: active/CVE-2013-2232
===================================================================
--- active/CVE-2013-2232	2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2232	2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable:
 sid: released (3.10.1-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-ip6_sk_dst_check-must-not-assume-ipv6-dst.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/ipv6-ipv6_sk_dst_check_must-not-assume-ipv6-dst.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/ipv6-ipv6_sk_dst_check_must-not-assume-ipv6-dst.patch]
 3.2-upstream-stable: released (3.2.50)

Modified: active/CVE-2013-2234
===================================================================
--- active/CVE-2013-2234	2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2234	2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.10.1-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/af_key-fix-info-leaks-in-notify-messages.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/af_key-fix-info-leaks-in-notify-msgs.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/af_key-fix-info-leaks-in-notify-msgs.patch]
 3.2-upstream-stable: released (3.2.50)

Modified: active/CVE-2013-2237
===================================================================
--- active/CVE-2013-2237	2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2237	2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.9.4-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/af_key-initialize-satype-in-key_notify_policy_flush.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/af_key-initialize-sa_type-in-key_notify_policy_flush.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/af_key-initialize-sa_type-in-key_notify_policy_flush.patch]
 3.2-upstream-stable: released (3.2.51)

Modified: active/CVE-2013-2239
===================================================================
--- active/CVE-2013-2239	2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2239	2013-09-30 05:21:13 UTC (rev 3100)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: N/A "openvz not upstream"
 sid: N/A "openvz no longer included"
 3.2-wheezy-security: N/A "openvz no longer included"
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [features/all/openvz/CVE-2013-2239.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [features/all/openvz/CVE-2013-2239.patch]
 3.2-upstream-stable: N/A "openvz not upstream"

Modified: active/CVE-2013-2851
===================================================================
--- active/CVE-2013-2851	2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2851	2013-09-30 05:21:13 UTC (rev 3100)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.9.8-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/block-do-not-pass-disk-names-as-format-strings.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/block-do-not-pass-disknames-as-formatstrings.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/block-do-not-pass-disknames-as-formatstrings.patch]
 3.2-upstream-stable: released (3.2.49)

Modified: active/CVE-2013-2852
===================================================================
--- active/CVE-2013-2852	2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2852	2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.9.8-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/b43-stop-format-string-leaking-into-error-msgs.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/b43-stop-formatstring-leak.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/b43-stop-formatstring-leak.patch]
 3.2-upstream-stable: released (3.2.47)

Modified: active/CVE-2013-2888
===================================================================
--- active/CVE-2013-2888	2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2888	2013-09-30 05:21:13 UTC (rev 3100)
@@ -8,6 +8,6 @@
 upstream: released (3.12-rc1) [43622021d2e2b82ea03d883926605bdd0525e1d1, be67b68d52fa28b9b721c47bb42068f0c1214855]
 2.6.32-upstream-stable: needed
 sid: released (3.10.11-1)
-3.2-wheezy-security: pending (3.2.51-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/hid-check-for-null-when-setting-values.patch, bugfix/all/hid-validate-report-id-size.patch]
+3.2-wheezy-security: released (3.2.51-1)
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/hid-check-for-null-when-setting-values.patch, bugfix/all/hid-validate-report-id-size.patch]
 3.2-upstream-stable: needed

Modified: active/CVE-2013-2892
===================================================================
--- active/CVE-2013-2892	2013-09-28 01:02:40 UTC (rev 3099)
+++ active/CVE-2013-2892	2013-09-30 05:21:13 UTC (rev 3100)
@@ -6,6 +6,6 @@
 upstream: released (3.12-rc1) [412f30105ec6735224535791eed5cdc02888ecb4]
 2.6.32-upstream-stable: needed
 sid: released (3.10.11-1)
-3.2-wheezy-security: pending (3.2.51-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze4) [bugfix/all/HID-pantherlord-validate-output-report-details.patch]
+3.2-wheezy-security: released (3.2.51-1)
+2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/HID-pantherlord-validate-output-report-details.patch]
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list