[kernel-sec-discuss] r3224 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon Feb 3 06:19:31 UTC 2014


Author: jmm
Date: 2014-02-03 06:18:27 +0000 (Mon, 03 Feb 2014)
New Revision: 3224

Modified:
   active/CVE-2013-4579
   active/CVE-2013-4587
   active/CVE-2013-6367
   active/CVE-2013-6368
   active/CVE-2013-6383
   active/CVE-2013-7263
   active/CVE-2013-7264
   active/CVE-2013-7265
   active/CVE-2013-7266
   active/CVE-2013-7267
   active/CVE-2013-7268
   active/CVE-2013-7269
   active/CVE-2013-7270
   active/CVE-2013-7271
   active/CVE-2014-1438
   active/CVE-2014-1446
Log:
wheezy update uploaded to spu


Modified: active/CVE-2013-4579
===================================================================
--- active/CVE-2013-4579	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-4579	2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
 upstream: 3.13-rc6 [657eb17d87852c42b55c4b06d5425baa08b2ddb3]
 2.6.32-upstream-stable: N/A "ath9k_htc not yet present"
 sid: released (3.12.8-1)
-3.2-wheezy-security: pending (3.2.54-1) [bugfix/all/ath9k_htc-properly-set-MAC-address-and-BSSID-mask.patch]
+3.2-wheezy-security: released (3.2.54-1) [bugfix/all/ath9k_htc-properly-set-MAC-address-and-BSSID-mask.patch]
 2.6.32-squeeze-security: N/A "ath9k_htc not yet present"
 3.2-upstream-stable:

Modified: active/CVE-2013-4587
===================================================================
--- active/CVE-2013-4587	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-4587	2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc4) [338c7dbadd2671189cec7faf64c84d01071b3f96]
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6367
===================================================================
--- active/CVE-2013-6367	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-6367	2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc4) [b963a22e6d1a266a67e9eecc88134713fd54775c]
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6368
===================================================================
--- active/CVE-2013-6368	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-6368	2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc4) [fda4e2e85589191b123d31cdc21fd33ee70f50fd]
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [bugfix/x86/KVM-Convert-vapic-synchronization-to-_cached-fun.patch]
+3.2-wheezy-security: released (3.2.54-1) [bugfix/x86/KVM-Convert-vapic-synchronization-to-_cached-fun.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-6383
===================================================================
--- active/CVE-2013-6383	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-6383	2014-02-03 06:18:27 UTC (rev 3224)
@@ -5,6 +5,6 @@
 upstream: released (3.13-rc1) [f856567b930dfcdbc3323261bf77240ccdde01f5]
 2.6.32-upstream-stable: needed
 sid: released (3.11.8-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.53)

Modified: active/CVE-2013-7263
===================================================================
--- active/CVE-2013-7263	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7263	2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]

Modified: active/CVE-2013-7264
===================================================================
--- active/CVE-2013-7264	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7264	2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]

Modified: active/CVE-2013-7265
===================================================================
--- active/CVE-2013-7265	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7265	2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]

Modified: active/CVE-2013-7266
===================================================================
--- active/CVE-2013-7266	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7266	2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,7 +12,7 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
 3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
 

Modified: active/CVE-2013-7267
===================================================================
--- active/CVE-2013-7267	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7267	2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,6 +12,6 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
 3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]

Modified: active/CVE-2013-7268
===================================================================
--- active/CVE-2013-7268	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7268	2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,6 +12,6 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
 3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]

Modified: active/CVE-2013-7269
===================================================================
--- active/CVE-2013-7269	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7269	2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,6 +12,6 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
 3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]

Modified: active/CVE-2013-7270
===================================================================
--- active/CVE-2013-7270	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7270	2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,6 +12,6 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
 3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]

Modified: active/CVE-2013-7271
===================================================================
--- active/CVE-2013-7271	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7271	2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,6 +12,6 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
 3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
\ No newline at end of file

Modified: active/CVE-2014-1438
===================================================================
--- active/CVE-2014-1438	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2014-1438	2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc8) [26bef1318adc1b3a530ecc807ef99346db2aa8b0]
 2.6.32-upstream-stable:
 sid: released (3.12.8-1)
-3.2-wheezy-security: pending (3.2.54-1) [bugfix/x86/fpu-amd-Clear-exceptions-in-AMD-FXSAVE-workaroun.patch]
+3.2-wheezy-security: released (3.2.54-1) [bugfix/x86/fpu-amd-Clear-exceptions-in-AMD-FXSAVE-workaroun.patch]
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2014-1446
===================================================================
--- active/CVE-2014-1446	2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2014-1446	2014-02-03 06:18:27 UTC (rev 3224)
@@ -5,6 +5,6 @@
 upstream: released (3.13-rc7) [8e3fbf870481eb53b2d3a322d1fc395ad8b367ed]
 2.6.32-upstream-stable: needed
 sid: released (3.12.8-1)
-3.2-wheezy-security: pending (3.2.54-1) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
+3.2-wheezy-security: released (3.2.54-1) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list