[kernel-sec-discuss] r3333 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Tue Apr 29 14:58:12 UTC 2014


Author: jmm
Date: 2014-04-29 14:58:12 +0000 (Tue, 29 Apr 2014)
New Revision: 3333

Modified:
   active/CVE-2013-0343
   active/CVE-2013-2929
   active/CVE-2013-4162
   active/CVE-2013-4299
   active/CVE-2013-4345
   active/CVE-2013-4511
   active/CVE-2013-4512
   active/CVE-2013-4587
   active/CVE-2013-6367
   active/CVE-2013-6378
   active/CVE-2013-6381
   active/CVE-2013-6382
   active/CVE-2013-6383
   active/CVE-2013-7263
   active/CVE-2013-7265
   active/CVE-2013-7339
   active/CVE-2014-0101
   active/CVE-2014-1444
   active/CVE-2014-1445
Log:
patches submitted for 2.6.32.x


Modified: active/CVE-2013-0343
===================================================================
--- active/CVE-2013-0343	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-0343	2014-04-29 14:58:12 UTC (rev 3333)
@@ -6,7 +6,7 @@
 Notes:
 Bugs:
 upstream: released (3.11) [4b08a8f1bd8cb4541c93ec170027b4d0782dab52]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.10.11-1)
 3.2-wheezy-security: released (3.2.51-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-0343-patch]

Modified: active/CVE-2013-2929
===================================================================
--- active/CVE-2013-2929	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-2929	2014-04-29 14:58:12 UTC (rev 3333)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.13-rc1) [d049f74f2dbe71354d43d393ac3a188947811348]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.11.10-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]

Modified: active/CVE-2013-4162
===================================================================
--- active/CVE-2013-4162	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-4162	2014-04-29 14:58:12 UTC (rev 3333)
@@ -4,7 +4,7 @@
  Fixed in 3.10.4
 Bugs:
 upstream: released (3.11-rc1) [8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.10.5-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-call-udp_push_pending_frames-when-uncorking-a-s.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4162.patch]

Modified: active/CVE-2013-4299
===================================================================
--- active/CVE-2013-4299	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-4299	2014-04-29 14:58:12 UTC (rev 3333)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.12-rc6) [e9c6a182649f4259db704ae15a91ac820e63b0ca]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.11.6-2) [bugfix/all/dm-snapshot-fix-data-corruption.patch]
 3.2-wheezy-security: released (3.2.53-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4299.patch]

Modified: active/CVE-2013-4345
===================================================================
--- active/CVE-2013-4345	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-4345	2014-04-29 14:58:12 UTC (rev 3333)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.13-rc1) [714b33d15130cbb5ab426456d4e3de842d6c5b8a]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.11.5-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/crypto-ansi_cprng-Fix-off-by-one-error-in-non-block-.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4345.patch]

Modified: active/CVE-2013-4511
===================================================================
--- active/CVE-2013-4511	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-4511	2014-04-29 14:58:12 UTC (rev 3333)
@@ -4,7 +4,7 @@
  jmm> au1?00 drivers not built in Debian
 Bugs:
 upstream: released (3.12) [7314e613d5ff9f0934f7a0f74ed7973b903315d1]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.11.8-1)
 3.2-wheezy-security: released (3.2.53-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4511.patch]

Modified: active/CVE-2013-4512
===================================================================
--- active/CVE-2013-4512	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-4512	2014-04-29 14:58:12 UTC (rev 3333)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.12) [201f99f170df14ba52ea4c52847779042b7a623b]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.11.8-1)
 3.2-wheezy-security: released (3.2.53-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4512.patch]

Modified: active/CVE-2013-4587
===================================================================
--- active/CVE-2013-4587	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-4587	2014-04-29 14:58:12 UTC (rev 3333)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.13-rc4) [338c7dbadd2671189cec7faf64c84d01071b3f96]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4587.patch]

Modified: active/CVE-2013-6367
===================================================================
--- active/CVE-2013-6367	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-6367	2014-04-29 14:58:12 UTC (rev 3333)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.13-rc4) [b963a22e6d1a266a67e9eecc88134713fd54775c]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/x86/KVM-Fix-potential-divide-by-0-in-lapic-CVE-2013-.patch]

Modified: active/CVE-2013-6378
===================================================================
--- active/CVE-2013-6378	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-6378	2014-04-29 14:58:12 UTC (rev 3333)
@@ -4,7 +4,7 @@
  Only triggerable by root
 Bugs:
 upstream: released (3.13-rc1) [a497e47d4aec37aaf8f13509f3ef3d1f6a717d88]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.11.10-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/libertas-potential-oops-in-debugfs.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6378.patch]

Modified: active/CVE-2013-6381
===================================================================
--- active/CVE-2013-6381	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-6381	2014-04-29 14:58:12 UTC (rev 3333)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.13-rc1) [6fb392b1a63ae36c31f62bc3fc8630b49d602b62]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
 3.2-wheezy-security: released (3.2.53-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6381.patch]

Modified: active/CVE-2013-6382
===================================================================
--- active/CVE-2013-6382	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-6382	2014-04-29 14:58:12 UTC (rev 3333)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released 3.13-rc3 [31978b5cc66b8ba8a7e8eef60b12395d41b7b890]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.11.10-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]

Modified: active/CVE-2013-6383
===================================================================
--- active/CVE-2013-6383	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-6383	2014-04-29 14:58:12 UTC (rev 3333)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.13-rc1) [f856567b930dfcdbc3323261bf77240ccdde01f5]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.11.8-1)
 3.2-wheezy-security: released (3.2.53-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6383.patch]

Modified: active/CVE-2013-7263
===================================================================
--- active/CVE-2013-7263	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-7263	2014-04-29 14:58:12 UTC (rev 3333)
@@ -4,7 +4,7 @@
  jmm> Originally CVE-2013-6405, was split into CVE-2013-726[345] and CVE-2013-7281
 Bugs:
 upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.12.4-1)
 3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6405-1.patch, bugfix/all/CVE-2013-6405-2.patch]

Modified: active/CVE-2013-7265
===================================================================
--- active/CVE-2013-7265	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-7265	2014-04-29 14:58:12 UTC (rev 3333)
@@ -4,7 +4,7 @@
  jmm> Originally CVE-2013-6405, was split into CVE-2013-726[345] and CVE-2013-7281
 Bugs:
 upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.12.4-1)
 3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6405-1.patch]

Modified: active/CVE-2013-7339
===================================================================
--- active/CVE-2013-7339	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2013-7339	2014-04-29 14:58:12 UTC (rev 3333)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.13-rc4)
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: pending
 sid: released (3.13-1~exp1)
 3.2-wheezy-security: released (3.2.56-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/rds-prevent-dereference-of-a-NULL-device.patch]

Modified: active/CVE-2014-0101
===================================================================
--- active/CVE-2014-0101	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2014-0101	2014-04-29 14:58:12 UTC (rev 3333)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.14-rc3) [ec0223ec48a90cb605244b45f7c62de856403729]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
 3.2-wheezy-security: released (3.2.56-1)
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]

Modified: active/CVE-2014-1444
===================================================================
--- active/CVE-2014-1444	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2014-1444	2014-04-29 14:58:12 UTC (rev 3333)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.13-rc1) [96b340406724d87e4621284ebac5e059d67b2194]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.53)
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/farsync-fix-info-leak-in-ioctl.patch]

Modified: active/CVE-2014-1445
===================================================================
--- active/CVE-2014-1445	2014-04-29 05:44:45 UTC (rev 3332)
+++ active/CVE-2014-1445	2014-04-29 14:58:12 UTC (rev 3333)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.13-rc1) [2b13d06c9584b4eb773f1e80bbaedab9a1c344e1]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.53)
 2.6.32-squeeze-security: released (2.6.32-48squeeze5) [bugfix/all/wanxl-fix-info-leak-in-ioctl.patch]




More information about the kernel-sec-discuss mailing list