[kernel-sec-discuss] r3222 - active

Dann Frazier dannf at moszumanska.debian.org
Wed Jan 29 05:56:44 UTC 2014


Author: dannf
Date: 2014-01-29 05:55:40 +0000 (Wed, 29 Jan 2014)
New Revision: 3222

Modified:
   active/CVE-2013-6367
   active/CVE-2013-6368
   active/CVE-2013-7263
   active/CVE-2013-7264
   active/CVE-2013-7265
   active/CVE-2013-7266
   active/CVE-2013-7267
   active/CVE-2013-7268
   active/CVE-2013-7269
   active/CVE-2013-7270
   active/CVE-2013-7271
   active/CVE-2013-7281
   active/CVE-2014-1438
   active/CVE-2014-1446
Log:
pending for wheezy

Modified: active/CVE-2013-6367
===================================================================
--- active/CVE-2013-6367	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-6367	2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc4) [b963a22e6d1a266a67e9eecc88134713fd54775c]
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6368
===================================================================
--- active/CVE-2013-6368	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-6368	2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc4) [fda4e2e85589191b123d31cdc21fd33ee70f50fd]
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.54-1) [bugfix/x86/KVM-Convert-vapic-synchronization-to-_cached-fun.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2013-7263
===================================================================
--- active/CVE-2013-7263	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7263	2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]

Modified: active/CVE-2013-7264
===================================================================
--- active/CVE-2013-7264	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7264	2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]

Modified: active/CVE-2013-7265
===================================================================
--- active/CVE-2013-7265	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7265	2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]

Modified: active/CVE-2013-7266
===================================================================
--- active/CVE-2013-7266	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7266	2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,7 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
+

Modified: active/CVE-2013-7267
===================================================================
--- active/CVE-2013-7267	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7267	2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,6 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]

Modified: active/CVE-2013-7268
===================================================================
--- active/CVE-2013-7268	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7268	2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,6 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]

Modified: active/CVE-2013-7269
===================================================================
--- active/CVE-2013-7269	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7269	2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,6 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]

Modified: active/CVE-2013-7270
===================================================================
--- active/CVE-2013-7270	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7270	2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,6 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]

Modified: active/CVE-2013-7271
===================================================================
--- active/CVE-2013-7271	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7271	2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,6 @@
 upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
 2.6.32-upstream-stable: ignored "too intrusive for too little gain"
 sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
 2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
\ No newline at end of file

Modified: active/CVE-2013-7281
===================================================================
--- active/CVE-2013-7281	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7281	2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
 2.6.32-upstream-stable:
 sid: released (3.12.4-1)
-3.2-wheezy-security:
+3.2-wheezy-security: N/A "vulnerable code not present; introduced in 3.10"
 2.6.32-squeeze-security:
-3.2-upstream-stable:
+3.2-upstream-stable: N/A "vulnerable code not present; introduced in 3.10"

Modified: active/CVE-2014-1438
===================================================================
--- active/CVE-2014-1438	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2014-1438	2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
 upstream: released (3.13-rc8) [26bef1318adc1b3a530ecc807ef99346db2aa8b0]
 2.6.32-upstream-stable:
 sid: released (3.12.8-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [bugfix/x86/fpu-amd-Clear-exceptions-in-AMD-FXSAVE-workaroun.patch]
 2.6.32-squeeze-security:
 3.2-upstream-stable:

Modified: active/CVE-2014-1446
===================================================================
--- active/CVE-2014-1446	2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2014-1446	2014-01-29 05:55:40 UTC (rev 3222)
@@ -5,6 +5,6 @@
 upstream: released (3.13-rc7) [8e3fbf870481eb53b2d3a322d1fc395ad8b367ed]
 2.6.32-upstream-stable: needed
 sid: released (3.12.8-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.54-1) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list