[kernel-sec-discuss] r3200 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Fri Jan 3 09:30:31 UTC 2014


Author: jmm
Date: 2014-01-03 09:29:28 +0000 (Fri, 03 Jan 2014)
New Revision: 3200

Modified:
   active/CVE-2013-2897
   active/CVE-2013-2929
   active/CVE-2013-4345
   active/CVE-2013-4348
   active/CVE-2013-4587
   active/CVE-2013-4592
   active/CVE-2013-6367
   active/CVE-2013-6378
   active/CVE-2013-6380
   active/CVE-2013-6382
Log:
3.2.54 released


Modified: active/CVE-2013-2897
===================================================================
--- active/CVE-2013-2897	2014-01-03 09:22:32 UTC (rev 3199)
+++ active/CVE-2013-2897	2014-01-03 09:29:28 UTC (rev 3200)
@@ -9,4 +9,4 @@
 sid: released (3.11.5-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/HID-multitouch-validate-indexes-details.patch]
 2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 5519cab477b61326963c8d523520db0342862b63"
-3.2-upstream-stable: pending (3.2.54)
+3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-2929
===================================================================
--- active/CVE-2013-2929	2014-01-03 09:22:32 UTC (rev 3199)
+++ active/CVE-2013-2929	2014-01-03 09:29:28 UTC (rev 3200)
@@ -7,4 +7,4 @@
 sid: released (3.11.10-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: pending (3.2.54)
+3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-4345
===================================================================
--- active/CVE-2013-4345	2014-01-03 09:22:32 UTC (rev 3199)
+++ active/CVE-2013-4345	2014-01-03 09:29:28 UTC (rev 3200)
@@ -8,4 +8,4 @@
 sid: released (3.11.5-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/crypto-ansi_cprng-Fix-off-by-one-error-in-non-block-.patch]
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: pending (3.2.54)
+3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-4348
===================================================================
--- active/CVE-2013-4348	2014-01-03 09:22:32 UTC (rev 3199)
+++ active/CVE-2013-4348	2014-01-03 09:29:28 UTC (rev 3200)
@@ -7,6 +7,6 @@
 upstream: released (3.12) [6f092343855a71e03b8d209815d8c45bf3a27fcd]
 2.6.32-upstream-stable: N/A "relevant code added in commit ec5efe794628, Linux 3.2-rc1"
 sid: released (3.11.6-2) [bugfix/all/CVE-2013-4348.patch]
-3.2-wheezy-security: pending (3.2.53-2) [bugfix/all/CVE-2013-4348.patch]
+3.2-wheezy-security: released (3.2.53-2) [bugfix/all/CVE-2013-4348.patch]
 2.6.32-squeeze-security: N/A "relevant code added in commit ec5efe794628, Linux 3.2-rc1"
-3.2-upstream-stable: pending (3.2.54)
+3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-4587
===================================================================
--- active/CVE-2013-4587	2014-01-03 09:22:32 UTC (rev 3199)
+++ active/CVE-2013-4587	2014-01-03 09:29:28 UTC (rev 3200)
@@ -8,4 +8,4 @@
 sid: released (3.12.6-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: pending (3.2.54)
+3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-4592
===================================================================
--- active/CVE-2013-4592	2014-01-03 09:22:32 UTC (rev 3199)
+++ active/CVE-2013-4592	2014-01-03 09:29:28 UTC (rev 3200)
@@ -7,4 +7,4 @@
 sid: released (3.8-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/KVM-perform-an-invalid-memslot-step-for-gpa-base-cha.patch, bugfix/all/KVM-Fix-iommu-map-unmap-to-handle-memory-slot-moves.patch]
 2.6.32-squeeze-security:
-3.2-upstream-stable: pending (3.2.54)
+3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6367
===================================================================
--- active/CVE-2013-6367	2014-01-03 09:22:32 UTC (rev 3199)
+++ active/CVE-2013-6367	2014-01-03 09:29:28 UTC (rev 3200)
@@ -8,4 +8,4 @@
 sid: released (3.12.6-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: pending (3.2.54)
+3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6378
===================================================================
--- active/CVE-2013-6378	2014-01-03 09:22:32 UTC (rev 3199)
+++ active/CVE-2013-6378	2014-01-03 09:29:28 UTC (rev 3200)
@@ -8,4 +8,4 @@
 sid: released (3.11.10-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/libertas-potential-oops-in-debugfs.patch]
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: pending (3.2.54)
+3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6380
===================================================================
--- active/CVE-2013-6380	2014-01-03 09:22:32 UTC (rev 3199)
+++ active/CVE-2013-6380	2014-01-03 09:29:28 UTC (rev 3200)
@@ -7,4 +7,4 @@
 sid: released (3.11.10-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/aacraid-prevent-invalid-pointer-dereference.patch]
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: pending (3.2.54)
+3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6382
===================================================================
--- active/CVE-2013-6382	2014-01-03 09:22:32 UTC (rev 3199)
+++ active/CVE-2013-6382	2014-01-03 09:29:28 UTC (rev 3200)
@@ -8,4 +8,4 @@
 sid: released (3.11.10-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
 2.6.32-squeeze-security: needed
-3.2-upstream-stable: pending (3.2.54)
+3.2-upstream-stable: released (3.2.54)




More information about the kernel-sec-discuss mailing list