[kernel-sec-discuss] r3283 - active
Ben Hutchings
benh at moszumanska.debian.org
Mon Mar 31 22:26:00 UTC 2014
Author: benh
Date: 2014-03-31 22:24:57 +0000 (Mon, 31 Mar 2014)
New Revision: 3283
Modified:
active/CVE-2013-0343
active/CVE-2013-2147
active/CVE-2013-2889
active/CVE-2013-2893
active/CVE-2013-4162
active/CVE-2013-4299
active/CVE-2013-4345
active/CVE-2013-4511
active/CVE-2013-4512
active/CVE-2013-4587
active/CVE-2013-4588
active/CVE-2013-6380
active/CVE-2013-6381
active/CVE-2013-6383
Log:
Add patch names for fixes pending in 2.6.32-48squeeze5
Modified: active/CVE-2013-0343
===================================================================
--- active/CVE-2013-0343 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-0343 2014-03-31 22:24:57 UTC (rev 3283)
@@ -9,5 +9,5 @@
2.6.32-upstream-stable: needed
sid: released (3.10.11-1)
3.2-wheezy-security: released (3.2.51-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-0343-patch]
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-2147
===================================================================
--- active/CVE-2013-2147 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-2147 2014-03-31 22:24:57 UTC (rev 3283)
@@ -8,5 +8,5 @@
2.6.32-upstream-stable: pending (2.6.32.62)
sid: released (3.11.5-1)
3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/cciss-fix-info-leak.patch, bugfix/all/cpqarray-fix-info-leak.patch]
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-2889
===================================================================
--- active/CVE-2013-2889 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-2889 2014-03-31 22:24:57 UTC (rev 3283)
@@ -8,5 +8,5 @@
2.6.32-upstream-stable: pending (2.6.32.62)
sid: released (3.11.5-1)
3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/hid-zeroplus-validate-output.patch]
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-2893
===================================================================
--- active/CVE-2013-2893 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-2893 2014-03-31 22:24:57 UTC (rev 3283)
@@ -8,5 +8,5 @@
2.6.32-upstream-stable: pending (2.6.32.62)
sid: released (3.11.5-1)
3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/hid-helper-to-validate-hid-reports.patch, bugfix/all/hid-lg-validate-hid-output-report-details.patch]
3.2-upstream-stable: released (3.2.52)
Modified: active/CVE-2013-4162
===================================================================
--- active/CVE-2013-4162 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-4162 2014-03-31 22:24:57 UTC (rev 3283)
@@ -7,6 +7,6 @@
2.6.32-upstream-stable: needed
sid: released (3.10.5-1)
3.2-wheezy-security: released (3.2.46-1+deb7u1) [bugfix/all/ipv6-call-udp_push_pending_frames-when-uncorking-a-s.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4162.patch]
3.2-upstream-stable: released (3.2.50)
Modified: active/CVE-2013-4299
===================================================================
--- active/CVE-2013-4299 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-4299 2014-03-31 22:24:57 UTC (rev 3283)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.6-2) [bugfix/all/dm-snapshot-fix-data-corruption.patch]
3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4299.patch]
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-4345
===================================================================
--- active/CVE-2013-4345 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-4345 2014-03-31 22:24:57 UTC (rev 3283)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.5-1)
3.2-wheezy-security: released (3.2.53-1) [bugfix/all/crypto-ansi_cprng-Fix-off-by-one-error-in-non-block-.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4345.patch]
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-4511
===================================================================
--- active/CVE-2013-4511 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-4511 2014-03-31 22:24:57 UTC (rev 3283)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.8-1)
3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4511.patch]
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-4512
===================================================================
--- active/CVE-2013-4512 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-4512 2014-03-31 22:24:57 UTC (rev 3283)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.8-1)
3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4512.patch]
3.2-upstream-stable: released (3.2.53)
Modified: active/CVE-2013-4587
===================================================================
--- active/CVE-2013-4587 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-4587 2014-03-31 22:24:57 UTC (rev 3283)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: needed
sid: released (3.12.6-1)
3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4587.patch]
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-4588
===================================================================
--- active/CVE-2013-4588 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-4588 2014-03-31 22:24:57 UTC (rev 3283)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (2.6.33-1~experimental.1)
3.2-wheezy-security: N/A
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-4588.patch]
3.2-upstream-stable: N/A
Modified: active/CVE-2013-6380
===================================================================
--- active/CVE-2013-6380 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-6380 2014-03-31 22:24:57 UTC (rev 3283)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: pending (2.6.32.62)
sid: released (3.11.10-1)
3.2-wheezy-security: released (3.2.53-1) [bugfix/all/aacraid-prevent-invalid-pointer-dereference.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6380.patch]
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-6381
===================================================================
--- active/CVE-2013-6381 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-6381 2014-03-31 22:24:57 UTC (rev 3283)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.10-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
3.2-wheezy-security: released (3.2.53-1) [bugfix/s390/qeth-avoid-buffer-overflow-in-snmp-ioctl.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6381.patch]
3.2-upstream-stable: released (3.2.54)
Modified: active/CVE-2013-6383
===================================================================
--- active/CVE-2013-6383 2014-03-31 22:23:04 UTC (rev 3282)
+++ active/CVE-2013-6383 2014-03-31 22:24:57 UTC (rev 3283)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: released (3.11.8-1)
3.2-wheezy-security: released (3.2.53-1)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze5)
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/CVE-2013-6383.patch]
3.2-upstream-stable: released (3.2.53)
More information about the kernel-sec-discuss
mailing list