[kernel-sec-discuss] r3269 - active

Dann Frazier dannf at moszumanska.debian.org
Tue Mar 25 04:56:20 UTC 2014


Author: dannf
Date: 2014-03-25 04:55:16 +0000 (Tue, 25 Mar 2014)
New Revision: 3269

Modified:
   active/CVE-2013-2929
   active/CVE-2013-6367
   active/CVE-2013-6382
   active/CVE-2013-7339
   active/CVE-2014-0101
   active/CVE-2014-1444
   active/CVE-2014-1445
   active/CVE-2014-1446
   active/CVE-2014-1874
   active/CVE-2014-2039
   active/CVE-2014-2523
Log:
Retargeted fixes for 2.6.32-48squeeze6 to the still open 2.6.32-48squeeze5

Modified: active/CVE-2013-2929
===================================================================
--- active/CVE-2013-2929	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2013-2929	2014-03-25 04:55:16 UTC (rev 3269)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1)
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/exec-ptrace-fix-get_dumpable-incorrect-tests.patch]
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6367
===================================================================
--- active/CVE-2013-6367	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2013-6367	2014-03-25 04:55:16 UTC (rev 3269)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.54-1) [linux_3.2.54.orig.tar.xz]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/x86/KVM-Fix-potential-divide-by-0-in-lapic-CVE-2013-.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/x86/KVM-Fix-potential-divide-by-0-in-lapic-CVE-2013-.patch]
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-6382
===================================================================
--- active/CVE-2013-6382	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2013-6382	2014-03-25 04:55:16 UTC (rev 3269)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.11.10-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
 3.2-wheezy-security: released (3.2.53-1) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/xfs-underflow-bug-in-xfs_attrlist_by_handle.patch]
 3.2-upstream-stable: released (3.2.54)

Modified: active/CVE-2013-7339
===================================================================
--- active/CVE-2013-7339	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2013-7339	2014-03-25 04:55:16 UTC (rev 3269)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable:
 sid: released (3.13-1~exp1)
 3.2-wheezy-security: needed
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/all/rds-prevent-dereference-of-a-NULL-device.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/rds-prevent-dereference-of-a-NULL-device.patch]
 3.2-upstream-stable: released (3.2.55)

Modified: active/CVE-2014-0101
===================================================================
--- active/CVE-2014-0101	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2014-0101	2014-03-25 04:55:16 UTC (rev 3269)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.13.6-1) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
 3.2-wheezy-security: needed
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/net-sctp-fix-sctp_sf_do_5_1D_ce-to-verify-if-we-peer.patch]
 3.2-upstream-stable: needed

Modified: active/CVE-2014-1444
===================================================================
--- active/CVE-2014-1444	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2014-1444	2014-03-25 04:55:16 UTC (rev 3269)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.53)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/all/farsync-fix-info-leak-in-ioctl.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/farsync-fix-info-leak-in-ioctl.patch]
 3.2-upstream-stable: released (3.2.51-1)

Modified: active/CVE-2014-1445
===================================================================
--- active/CVE-2014-1445	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2014-1445	2014-03-25 04:55:16 UTC (rev 3269)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.12.6-1)
 3.2-wheezy-security: released (3.2.53)
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/all/wanxl-fix-info-leak-in-ioctl.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/wanxl-fix-info-leak-in-ioctl.patch]
 3.2-upstream-stable: released (3.2.51-1)

Modified: active/CVE-2014-1446
===================================================================
--- active/CVE-2014-1446	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2014-1446	2014-03-25 04:55:16 UTC (rev 3269)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.12.8-1)
 3.2-wheezy-security: released (3.2.54-1) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/hamradio-yam-fix-info-leak-in-ioctl.patch]
 3.2-upstream-stable: released (3.2.55)

Modified: active/CVE-2014-1874
===================================================================
--- active/CVE-2014-1874	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2014-1874	2014-03-25 04:55:16 UTC (rev 3269)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable:
 sid: released (3.13.4-1)
 3.2-wheezy-security:
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/all/SELinux-Fix-kernel-BUG-on-empty-security-contexts.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/SELinux-Fix-kernel-BUG-on-empty-security-contexts.patch]
 3.2-upstream-stable:

Modified: active/CVE-2014-2039
===================================================================
--- active/CVE-2014-2039	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2014-2039	2014-03-25 04:55:16 UTC (rev 3269)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable:
 sid: released (3.13.5-1)
 3.2-wheezy-security:
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/s390/fix-kernel-crash-due-to-linkage-stack-instructi.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/s390/fix-kernel-crash-due-to-linkage-stack-instructi.patch]
 3.2-upstream-stable:

Modified: active/CVE-2014-2523
===================================================================
--- active/CVE-2014-2523	2014-03-25 04:54:04 UTC (rev 3268)
+++ active/CVE-2014-2523	2014-03-25 04:55:16 UTC (rev 3269)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.13-1~exp1)
 3.2-wheezy-security: needed
-2.6.32-squeeze-security: pending (2.6.32-48squeeze6) [bugfix/all/netfilter-nf_conntrack_dccp-fix-skb_header_pointer-A.patch]
+2.6.32-squeeze-security: pending (2.6.32-48squeeze5) [bugfix/all/netfilter-nf_conntrack_dccp-fix-skb_header_pointer-A.patch]
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list