[kernel-sec-discuss] r3222 - active
Dann Frazier
dannf at moszumanska.debian.org
Wed Jan 29 05:56:44 UTC 2014
Author: dannf
Date: 2014-01-29 05:55:40 +0000 (Wed, 29 Jan 2014)
New Revision: 3222
Modified:
active/CVE-2013-6367
active/CVE-2013-6368
active/CVE-2013-7263
active/CVE-2013-7264
active/CVE-2013-7265
active/CVE-2013-7266
active/CVE-2013-7267
active/CVE-2013-7268
active/CVE-2013-7269
active/CVE-2013-7270
active/CVE-2013-7271
active/CVE-2013-7281
active/CVE-2014-1438
active/CVE-2014-1446
Log:
pending for wheezy
Modified: active/CVE-2013-6367
===================================================================
--- active/CVE-2013-6367 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-6367 2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc4) [b963a22e6d1a266a67e9eecc88134713fd54775c]
2.6.32-upstream-stable: needed
sid: released (3.12.6-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-6368
===================================================================
--- active/CVE-2013-6368 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-6368 2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc4) [fda4e2e85589191b123d31cdc21fd33ee70f50fd]
2.6.32-upstream-stable: needed
sid: released (3.12.6-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.54-1) [bugfix/x86/KVM-Convert-vapic-synchronization-to-_cached-fun.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2013-7263
===================================================================
--- active/CVE-2013-7263 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7263 2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
2.6.32-upstream-stable:
sid: released (3.12.4-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]
Modified: active/CVE-2013-7264
===================================================================
--- active/CVE-2013-7264 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7264 2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
2.6.32-upstream-stable:
sid: released (3.12.4-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]
Modified: active/CVE-2013-7265
===================================================================
--- active/CVE-2013-7265 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7265 2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
2.6.32-upstream-stable:
sid: released (3.12.4-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.54) [b38ecb9bbbb42b71833ff4439283f51120a35c1a, b38ecb9bbbb42b71833ff4439283f51120a35c1a]
Modified: active/CVE-2013-7266
===================================================================
--- active/CVE-2013-7266 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7266 2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,7 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
+
Modified: active/CVE-2013-7267
===================================================================
--- active/CVE-2013-7267 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7267 2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,6 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
Modified: active/CVE-2013-7268
===================================================================
--- active/CVE-2013-7268 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7268 2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,6 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
Modified: active/CVE-2013-7269
===================================================================
--- active/CVE-2013-7269 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7269 2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,6 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
Modified: active/CVE-2013-7270
===================================================================
--- active/CVE-2013-7270 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7270 2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,6 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
Modified: active/CVE-2013-7271
===================================================================
--- active/CVE-2013-7271 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7271 2014-01-29 05:55:40 UTC (rev 3222)
@@ -12,6 +12,6 @@
upstream: released (3.13-rc1) [f3d3342602f8bcbf37d7c46641cb9bca7618eb1c]
2.6.32-upstream-stable: ignored "too intrusive for too little gain"
sid: released (3.12.6-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [linux_3.2.54.orig.tar.xz]
2.6.32-squeeze-security: ignored "too intrusive for too little gain"
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.54) [a598f7fa9c24c3ef458043d59c237b8fc5d1adad]
\ No newline at end of file
Modified: active/CVE-2013-7281
===================================================================
--- active/CVE-2013-7281 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2013-7281 2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc2) [bceaa90240b6019ed73b49965eac7d167610be69, 85fbaa75037d0b6b786ff18658ddf0b4014ce2a4]
2.6.32-upstream-stable:
sid: released (3.12.4-1)
-3.2-wheezy-security:
+3.2-wheezy-security: N/A "vulnerable code not present; introduced in 3.10"
2.6.32-squeeze-security:
-3.2-upstream-stable:
+3.2-upstream-stable: N/A "vulnerable code not present; introduced in 3.10"
Modified: active/CVE-2014-1438
===================================================================
--- active/CVE-2014-1438 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2014-1438 2014-01-29 05:55:40 UTC (rev 3222)
@@ -6,6 +6,6 @@
upstream: released (3.13-rc8) [26bef1318adc1b3a530ecc807ef99346db2aa8b0]
2.6.32-upstream-stable:
sid: released (3.12.8-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.54-1) [bugfix/x86/fpu-amd-Clear-exceptions-in-AMD-FXSAVE-workaroun.patch]
2.6.32-squeeze-security:
3.2-upstream-stable:
Modified: active/CVE-2014-1446
===================================================================
--- active/CVE-2014-1446 2014-01-29 05:54:35 UTC (rev 3221)
+++ active/CVE-2014-1446 2014-01-29 05:55:40 UTC (rev 3222)
@@ -5,6 +5,6 @@
upstream: released (3.13-rc7) [8e3fbf870481eb53b2d3a322d1fc395ad8b367ed]
2.6.32-upstream-stable: needed
sid: released (3.12.8-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.54-1) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list