[kernel-sec-discuss] r3327 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Apr 28 06:19:05 UTC 2014


Author: jmm
Date: 2014-04-28 06:19:05 +0000 (Mon, 28 Apr 2014)
New Revision: 3327

Modified:
   active/CVE-2013-0343
   active/CVE-2013-2147
   active/CVE-2013-2889
   active/CVE-2013-2893
   active/CVE-2013-2929
   active/CVE-2013-4162
   active/CVE-2013-4299
   active/CVE-2013-4345
   active/CVE-2013-4512
   active/CVE-2013-4587
   active/CVE-2013-6367
   active/CVE-2013-6380
   active/CVE-2013-6381
   active/CVE-2013-6382
   active/CVE-2013-6383
   active/CVE-2013-7263
   active/CVE-2013-7265
   active/CVE-2013-7339
   active/CVE-2014-0101
   active/CVE-2014-1444
   active/CVE-2014-1445
   active/CVE-2014-1446
   active/CVE-2014-1874
   active/CVE-2014-2039
   active/CVE-2014-2523
Log:
linux-2.6 DSA released


Modified: active/CVE-2013-0343
===================================================================
--- active/CVE-2013-0343	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-0343	2014-04-28 06:19:05 UTC (rev 3327)
@@ -9,5 +9,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.10.11-1)
 3.2-wheezy-security: released (3.2.51-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-0343-patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-0343-patch]
 3.2-upstream-stable: released (3.2.52)

Modified: active/CVE-2013-2147
===================================================================
--- active/CVE-2013-2147	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-2147	2014-04-28 06:19:05 UTC (rev 3327)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable: pending (2.6.32.62)
 sid: released (3.11.5-1)
 3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/cciss-fix-info-leak.patch, bugfix/all/cpqarray-fix-info-leak.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/cciss-fix-info-leak.patch, bugfix/all/cpqarray-fix-info-leak.patch]
 3.2-upstream-stable: released (3.2.52)

Modified: active/CVE-2013-2889
===================================================================
--- active/CVE-2013-2889	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-2889	2014-04-28 06:19:05 UTC (rev 3327)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable: pending (2.6.32.62)
 sid: released (3.11.5-1)
 3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/hid-zeroplus-validate-output.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/hid-zeroplus-validate-output.patch]
 3.2-upstream-stable: released (3.2.52)

Modified: active/CVE-2013-2893
===================================================================
--- active/CVE-2013-2893	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-2893	2014-04-28 06:19:05 UTC (rev 3327)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable: pending (2.6.32.62)
 sid: released (3.11.5-1)
 3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/hid-helper-to-validate-hid-reports.patch, bugfix/all/hid-lg-validate-hid-output-report-details.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/hid-helper-to-validate-hid-reports.patch, bugfix/all/hid-lg-validate-hid-output-report-details.patch]
 3.2-upstream-stable: released (3.2.52)

Modified: active/CVE-2013-2929
===================================================================
--- active/CVE-2013-2929	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-2929	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-4162
===================================================================
--- active/CVE-2013-4162	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-4162	2014-04-28 06:19:05 UTC (rev 3327)
@@ -7,6 +7,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.10.5-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-call-udp_push_pending_frames-when-uncorking-a-s.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4162.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4162.patch]
 3.2-upstream-stable: released (3.2.50)
 

Modified: active/CVE-2013-4299
===================================================================
--- active/CVE-2013-4299	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-4299	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.6-2) [bugfix/all/dm-snapshot-fix-data-corruption.patch]
 3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4299.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4299.patch]
 3.2-upstream-stable: released (3.2.53)

Modified: active/CVE-2013-4345
===================================================================
--- active/CVE-2013-4345	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-4345	2014-04-28 06:19:05 UTC (rev 3327)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.5-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/crypto-ansi_cprng-Fix-off-by-one-error-in-non-block-.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4345.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4345.patch]
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-4512
===================================================================
--- active/CVE-2013-4512	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-4512	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.8-1)
 3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4512.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4512.patch]
 3.2-upstream-stable: released (3.2.53)

Modified: active/CVE-2013-4587
===================================================================
--- active/CVE-2013-4587	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-4587	2014-04-28 06:19:05 UTC (rev 3327)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4587.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4587.patch]
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6367
===================================================================
--- active/CVE-2013-6367	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-6367	2014-04-28 06:19:05 UTC (rev 3327)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/x86/KVM-Fix-potential-divide-by-0-in-lapic-CVE-2013-.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/x86/KVM-Fix-potential-divide-by-0-in-lapic-CVE-2013-.patch]
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6380
===================================================================
--- active/CVE-2013-6380	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-6380	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: pending (2.6.32.62)
 sid: released (3.11.10-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/aacraid-prevent-invalid-pointer-dereference.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6380.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6380.patch]
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6381
===================================================================
--- active/CVE-2013-6381	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-6381	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
 3.2-wheezy-security: released (3.2.53-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6381.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6381.patch]
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6382
===================================================================
--- active/CVE-2013-6382	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-6382	2014-04-28 06:19:05 UTC (rev 3327)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6383
===================================================================
--- active/CVE-2013-6383	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-6383	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.8-1)
 3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6383.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6383.patch]
 3.2-upstream-stable: released (3.2.53)

Modified: active/CVE-2013-7263
===================================================================
--- active/CVE-2013-7263	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-7263	2014-04-28 06:19:05 UTC (rev 3327)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
 3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6405-1.patch, bugfix/all/CVE-2013-6405-2.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6405-1.patch, bugfix/all/CVE-2013-6405-2.patch]
 3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]

Modified: active/CVE-2013-7265
===================================================================
--- active/CVE-2013-7265	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-7265	2014-04-28 06:19:05 UTC (rev 3327)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
 3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6405-1.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6405-1.patch]
 3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a]

Modified: active/CVE-2013-7339
===================================================================
--- active/CVE-2013-7339	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2013-7339	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable:
 sid: released (3.13-1~exp1)
 3.2-wheezy-security: released (3.2.56-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/rds-prevent-dereference-of-a-NULL-device.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/rds-prevent-dereference-of-a-NULL-device.patch]
 3.2-upstream-stable: released (3.2.55)

Modified: active/CVE-2014-0101
===================================================================
--- active/CVE-2014-0101	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2014-0101	2014-04-28 06:19:05 UTC (rev 3327)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
 3.2-wheezy-security: released (3.2.56-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
 3.2-upstream-stable: released (3.2.56)

Modified: active/CVE-2014-1444
===================================================================
--- active/CVE-2014-1444	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2014-1444	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.53)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/farsync-fix-info-leak-in-ioctl.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/farsync-fix-info-leak-in-ioctl.patch]
 3.2-upstream-stable: released (3.2.51-1)

Modified: active/CVE-2014-1445
===================================================================
--- active/CVE-2014-1445	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2014-1445	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.53)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/wanxl-fix-info-leak-in-ioctl.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/wanxl-fix-info-leak-in-ioctl.patch]
 3.2-upstream-stable: released (3.2.51-1)

Modified: active/CVE-2014-1446
===================================================================
--- active/CVE-2014-1446	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2014-1446	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.12.8-1)
 3.2-wheezy-security: released (3.2.54-1) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
 3.2-upstream-stable: released (3.2.55)

Modified: active/CVE-2014-1874
===================================================================
--- active/CVE-2014-1874	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2014-1874	2014-04-28 06:19:05 UTC (rev 3327)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.13.4-1)
 3.2-wheezy-security: released (3.2.56-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/SELinux-Fix-kernel-BUG-on-empty-security-contexts.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/SELinux-Fix-kernel-BUG-on-empty-security-contexts.patch]
 3.2-upstream-stable: released (3.2.56)

Modified: active/CVE-2014-2039
===================================================================
--- active/CVE-2014-2039	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2014-2039	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable:
 sid: released (3.13.5-1)
 3.2-wheezy-security: released (3.2.57-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/s390/fix-kernel-crash-due-to-linkage-stack-instructi.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/s390/fix-kernel-crash-due-to-linkage-stack-instructi.patch]
 3.2-upstream-stable: released (3.2.57) [s390-fix-kernel-crash-due-to-linkage-stack-instructions.patch]

Modified: active/CVE-2014-2523
===================================================================
--- active/CVE-2014-2523	2014-04-25 00:12:39 UTC (rev 3326)
+++ active/CVE-2014-2523	2014-04-28 06:19:05 UTC (rev 3327)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.13.10-1)
 3.2-wheezy-security: released (3.2.57-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/netfilter-nf_conntrack_dccp-fix-skb_header_pointer-A.patch]
+2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/netfilter-nf_conntrack_dccp-fix-skb_header_pointer-A.patch]
 3.2-upstream-stable: released (3.2.57) [netfilter-nf_conntrack_dccp-fix-skb_header_pointer-api-usages.patch]




More information about the kernel-sec-discuss mailing list