[kernel-sec-discuss] r3212 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed Jan 15 19:02:17 UTC 2014


Author: jmm
Date: 2014-01-15 19:01:14 +0000 (Wed, 15 Jan 2014)
New Revision: 3212

Modified:
   active/CVE-2013-0343
   active/CVE-2013-4162
   active/CVE-2013-4299
   active/CVE-2013-4345
   active/CVE-2013-4511
   active/CVE-2013-4512
   active/CVE-2013-4587
   active/CVE-2013-4588
   active/CVE-2013-6282
   active/CVE-2013-6378
   active/CVE-2013-6380
   active/CVE-2013-6381
   active/CVE-2013-6383
   active/CVE-2013-7263
   active/CVE-2013-7264
   active/CVE-2013-7265
Log:
pending fixes for oldstable


Modified: active/CVE-2013-0343
===================================================================
--- active/CVE-2013-0343	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-0343	2014-01-15 19:01:14 UTC (rev 3212)
@@ -9,5 +9,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.10.11-1)
 3.2-wheezy-security: released (3.2.51-1)
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.52)

Modified: active/CVE-2013-4162
===================================================================
--- active/CVE-2013-4162	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4162	2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,6 +7,6 @@
 2.6.32-upstream-stable: needed
 sid: released (3.10.5-1)
 3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-call-udp_push_pending_frames-when-uncorking-a-s.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.50)
 

Modified: active/CVE-2013-4299
===================================================================
--- active/CVE-2013-4299	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4299	2014-01-15 19:01:14 UTC (rev 3212)
@@ -3,8 +3,8 @@
 Notes:
 Bugs:
 upstream: released (3.12-rc6) [e9c6a182649f4259db704ae15a91ac820e63b0ca]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
 sid: released (3.11.6-2) [bugfix/all/dm-snapshot-fix-data-corruption.patch]
 3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.53)

Modified: active/CVE-2013-4345
===================================================================
--- active/CVE-2013-4345	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4345	2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.5-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/crypto-ansi_cprng-Fix-off-by-one-error-in-non-block-.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-4511
===================================================================
--- active/CVE-2013-4511	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4511	2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.8-1)
 3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.53)

Modified: active/CVE-2013-4512
===================================================================
--- active/CVE-2013-4512	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4512	2014-01-15 19:01:14 UTC (rev 3212)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.8-1)
 3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.53)

Modified: active/CVE-2013-4587
===================================================================
--- active/CVE-2013-4587	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4587	2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
 3.2-wheezy-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-4588
===================================================================
--- active/CVE-2013-4588	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4588	2014-01-15 19:01:14 UTC (rev 3212)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (2.6.33-1~experimental.1)
 3.2-wheezy-security: N/A
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: N/A

Modified: active/CVE-2013-6282
===================================================================
--- active/CVE-2013-6282	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-6282	2014-01-15 19:01:14 UTC (rev 3212)
@@ -4,8 +4,8 @@
 Notes:
 Bugs:
 upstream: released (3.6) [8404663f81d212918ff85f493649a7991209fa04]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
 sid: released (3.6.4-1~experimental.1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/arm/ARM-7527-1-uaccess-explicitly-check-__user-pointer-w.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable:
\ No newline at end of file

Modified: active/CVE-2013-6378
===================================================================
--- active/CVE-2013-6378	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-6378	2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/libertas-potential-oops-in-debugfs.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6380
===================================================================
--- active/CVE-2013-6380	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-6380	2014-01-15 19:01:14 UTC (rev 3212)
@@ -3,8 +3,8 @@
 Notes:
 Bugs:
 upstream: released (3.13-rc1) [b4789b8e6be3151a955ade74872822f30e8cd914]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.62)
 sid: released (3.11.10-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/aacraid-prevent-invalid-pointer-dereference.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6381
===================================================================
--- active/CVE-2013-6381	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-6381	2014-01-15 19:01:14 UTC (rev 3212)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
 3.2-wheezy-security: released (3.2.53-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: needed

Modified: active/CVE-2013-6383
===================================================================
--- active/CVE-2013-6383	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-6383	2014-01-15 19:01:14 UTC (rev 3212)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.8-1)
 3.2-wheezy-security: pending (3.2.53-1)
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable: released (3.2.53)

Modified: active/CVE-2013-7263
===================================================================
--- active/CVE-2013-7263	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-7263	2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
 3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable:

Modified: active/CVE-2013-7264
===================================================================
--- active/CVE-2013-7264	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-7264	2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
 3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable:

Modified: active/CVE-2013-7265
===================================================================
--- active/CVE-2013-7265	2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-7265	2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
 3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
 3.2-upstream-stable:




More information about the kernel-sec-discuss mailing list