[kernel-sec-discuss] r3224 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Mon Feb 3 06:19:31 UTC 2014
Author: jmm
Date: 2014-02-03 06:18:27 +0000 (Mon, 03 Feb 2014)
New Revision: 3224
Modified:
active/CVE-2013-4579
active/CVE-2013-4587
active/CVE-2013-6367
active/CVE-2013-6368
active/CVE-2013-6383
active/CVE-2013-7263
active/CVE-2013-7264
active/CVE-2013-7265
active/CVE-2013-7266
active/CVE-2013-7267
active/CVE-2013-7268
active/CVE-2013-7269
active/CVE-2013-7270
active/CVE-2013-7271
active/CVE-2014-1438
active/CVE-2014-1446
Log:
wheezy update uploaded to spu
Modified: active/CVE-2013-4579
===================================================================
--- active/CVE-2013-4579 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-4579 2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
upstream: 3.13-rc6 [657eb17d87852c42b55c4b06d5425baa08b2ddb3]
2.6.32-upstream-stable: N/A "ath9k_htc not yet present"
sid: released (3.12.8-1)
-3.2-wheezy-security: pending (3.2.54-1) [bugfix/all/ath9k_htc-properly-set-MAC-address-and-BSSID-mask.patch]
+3.2-wheezy-security: released (3.2.54-1) [bugfix/all/ath9k_htc-properly-set-MAC-address-and-BSSID-mask.patch]
2.6.32-squeeze-security: N/A "ath9k_htc not yet present"
3.2-upstream-stable:
Modified: active/CVE-2013-4587
===================================================================
--- active/CVE-2013-4587 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-4587 2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc4) [338c7dbadd2671189cec7faf64c84d01071b3f96]
2.6.32-upstream-stable: needed
sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-6367
===================================================================
--- active/CVE-2013-6367 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-6367 2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc4) [b963a22e6d1a266a67e9eecc88134713fd54775c]
2.6.32-upstream-stable: needed
sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-6368
===================================================================
--- active/CVE-2013-6368 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-6368 2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc4) [fda4e2e85589191b123d31cdc21fd33ee70f50fd]
2.6.32-upstream-stable: needed
sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [bugfix/x86/KVM-Convert-vapic-synchronization-to-_cached-fun.patch]
+3.2-wheezy-security: released (3.2.54-1) [bugfix/x86/KVM-Convert-vapic-synchronization-to-_cached-fun.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-6383
===================================================================
--- active/CVE-2013-6383 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-6383 2014-02-03 06:18:27 UTC (rev 3224)
@@ -5,6 +5,6 @@
upstream: released (3.13-rc1) [f856567b930dfcdbc3323261bf77240ccdde01f5]
2.6.32-upstream-stable: needed
sid: released (3.11.8-1)
-3.2-wheezy-security: pending (3.2.53-1)
+3.2-wheezy-security: released (3.2.53-1)
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-7263
===================================================================
--- active/CVE-2013-7263 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7263 2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
2.6.32-upstream-stable:
sid: released (3.12.4-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]
Modified: active/CVE-2013-7264
===================================================================
--- active/CVE-2013-7264 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7264 2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
2.6.32-upstream-stable:
sid: released (3.12.4-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]
Modified: active/CVE-2013-7265
===================================================================
--- active/CVE-2013-7265 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7265 2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
2.6.32-upstream-stable:
sid: released (3.12.4-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]
Modified: active/CVE-2013-7266
===================================================================
--- active/CVE-2013-7266 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7266 2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,7 +12,7 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
Modified: active/CVE-2013-7267
===================================================================
--- active/CVE-2013-7267 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7267 2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,6 +12,6 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
Modified: active/CVE-2013-7268
===================================================================
--- active/CVE-2013-7268 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7268 2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,6 +12,6 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
Modified: active/CVE-2013-7269
===================================================================
--- active/CVE-2013-7269 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7269 2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,6 +12,6 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
Modified: active/CVE-2013-7270
===================================================================
--- active/CVE-2013-7270 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7270 2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,6 +12,6 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
Modified: active/CVE-2013-7271
===================================================================
--- active/CVE-2013-7271 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2013-7271 2014-02-03 06:18:27 UTC (rev 3224)
@@ -12,6 +12,6 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
+3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
\ No newline at end of file
Modified: active/CVE-2014-1438
===================================================================
--- active/CVE-2014-1438 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2014-1438 2014-02-03 06:18:27 UTC (rev 3224)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc8) [26bef1318adc1b3a530ecc807ef99346db2aa8b0]
2.6.32-upstream-stable:
sid: released (3.12.8-1)
-3.2-wheezy-security: pending (3.2.54-1) [bugfix/x86/fpu-amd-Clear-exceptions-in-AMD-FXSAVE-workaroun.patch]
+3.2-wheezy-security: released (3.2.54-1) [bugfix/x86/fpu-amd-Clear-exceptions-in-AMD-FXSAVE-workaroun.patch]
2.6.32-squeeze-security:
3.2-upstream-stable:
Modified: active/CVE-2014-1446
===================================================================
--- active/CVE-2014-1446 2014-01-29 05:56:53 UTC (rev 3223)
+++ active/CVE-2014-1446 2014-02-03 06:18:27 UTC (rev 3224)
@@ -5,6 +5,6 @@
upstream: released (3.13-rc7) [8e3fbf870481eb53b2d3a322d1fc395ad8b367ed]
2.6.32-upstream-stable: needed
sid: released (3.12.8-1)
-3.2-wheezy-security: pending (3.2.54-1) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
+3.2-wheezy-security: released (3.2.54-1) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list