[kernel-sec-discuss] r3212 - active
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Wed Jan 15 19:02:17 UTC 2014
Author: jmm
Date: 2014-01-15 19:01:14 +0000 (Wed, 15 Jan 2014)
New Revision: 3212
Modified:
active/CVE-2013-0343
active/CVE-2013-4162
active/CVE-2013-4299
active/CVE-2013-4345
active/CVE-2013-4511
active/CVE-2013-4512
active/CVE-2013-4587
active/CVE-2013-4588
active/CVE-2013-6282
active/CVE-2013-6378
active/CVE-2013-6380
active/CVE-2013-6381
active/CVE-2013-6383
active/CVE-2013-7263
active/CVE-2013-7264
active/CVE-2013-7265
Log:
pending fixes for oldstable
Modified: active/CVE-2013-0343
===================================================================
--- active/CVE-2013-0343 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-0343 2014-01-15 19:01:14 UTC (rev 3212)
@@ -9,5 +9,5 @@
2.6.32-upstream-stable: needed
sid: released (3.10.11-1)
3.2-wheezy-security: released (3.2.51-1)
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-4162
===================================================================
--- active/CVE-2013-4162 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4162 2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,6 +7,6 @@
2.6.32-upstream-stable: needed
sid: released (3.10.5-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-call-udp_push_pending_frames-when-uncorking-a-s.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.50)
Modified: active/CVE-2013-4299
===================================================================
--- active/CVE-2013-4299 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4299 2014-01-15 19:01:14 UTC (rev 3212)
@@ -3,8 +3,8 @@
Notes:
Bugs:
upstream: released (3.12-rc6) [e9c6a182649f4259db704ae15a91ac820e63b0ca]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
sid: released (3.11.6-2) [bugfix/all/dm-snapshot-fix-data-corruption.patch]
3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-4345
===================================================================
--- active/CVE-2013-4345 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4345 2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.5-1)
3.2-wheezy-security: released (3.2.53-1) [bugfix/all/crypto-ansi_cprng-Fix-off-by-one-error-in-non-block-.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-4511
===================================================================
--- active/CVE-2013-4511 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4511 2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.8-1)
3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-4512
===================================================================
--- active/CVE-2013-4512 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4512 2014-01-15 19:01:14 UTC (rev 3212)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.8-1)
3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-4587
===================================================================
--- active/CVE-2013-4587 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4587 2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: needed
sid: released (3.12.6-1)
3.2-wheezy-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-4588
===================================================================
--- active/CVE-2013-4588 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-4588 2014-01-15 19:01:14 UTC (rev 3212)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (2.6.33-1~experimental.1)
3.2-wheezy-security: N/A
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: N/A
Modified: active/CVE-2013-6282
===================================================================
--- active/CVE-2013-6282 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-6282 2014-01-15 19:01:14 UTC (rev 3212)
@@ -4,8 +4,8 @@
Notes:
Bugs:
upstream: released (3.6) [8404663f81d212918ff85f493649a7991209fa04]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: needed
sid: released (3.6.4-1~experimental.1)
3.2-wheezy-security: released (3.2.53-1) [bugfix/arm/ARM-7527-1-uaccess-explicitly-check-__user-pointer-w.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable:
\ No newline at end of file
Modified: active/CVE-2013-6378
===================================================================
--- active/CVE-2013-6378 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-6378 2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.10-1)
3.2-wheezy-security: released (3.2.53-1) [bugfix/all/libertas-potential-oops-in-debugfs.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-6380
===================================================================
--- active/CVE-2013-6380 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-6380 2014-01-15 19:01:14 UTC (rev 3212)
@@ -3,8 +3,8 @@
Notes:
Bugs:
upstream: released (3.13-rc1) [b4789b8e6be3151a955ade74872822f30e8cd914]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.62)
sid: released (3.11.10-1)
3.2-wheezy-security: released (3.2.53-1) [bugfix/all/aacraid-prevent-invalid-pointer-dereference.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-6381
===================================================================
--- active/CVE-2013-6381 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-6381 2014-01-15 19:01:14 UTC (rev 3212)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
3.2-wheezy-security: released (3.2.53-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: needed
Modified: active/CVE-2013-6383
===================================================================
--- active/CVE-2013-6383 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-6383 2014-01-15 19:01:14 UTC (rev 3212)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.8-1)
3.2-wheezy-security: pending (3.2.53-1)
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-7263
===================================================================
--- active/CVE-2013-7263 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-7263 2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable:
sid: released (3.12.4-1)
3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable:
Modified: active/CVE-2013-7264
===================================================================
--- active/CVE-2013-7264 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-7264 2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable:
sid: released (3.12.4-1)
3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable:
Modified: active/CVE-2013-7265
===================================================================
--- active/CVE-2013-7265 2014-01-14 05:46:50 UTC (rev 3211)
+++ active/CVE-2013-7265 2014-01-15 19:01:14 UTC (rev 3212)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable:
sid: released (3.12.4-1)
3.2-wheezy-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
3.2-upstream-stable:
More information about the kernel-sec-discuss
mailing list