diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2013-10-22 04:44:19 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2013-10-22 04:44:19 +0000 |
commit | 09d793aa0d6e20eaa7a15761e645eda86c1720e5 (patch) | |
tree | c2ca0b70b2268f0434b13d9cd7c3f3156fadf09f | |
parent | 330bdc1056cafaf5987783de28e60caa7fd53682 (diff) |
pending fixes for 3.2.52
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3125 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r-- | active/CVE-2013-0343 | 2 | ||||
-rw-r--r-- | active/CVE-2013-2147 | 2 | ||||
-rw-r--r-- | active/CVE-2013-2888 | 2 | ||||
-rw-r--r-- | active/CVE-2013-2889 | 2 | ||||
-rw-r--r-- | active/CVE-2013-2892 | 2 | ||||
-rw-r--r-- | active/CVE-2013-2893 | 2 | ||||
-rw-r--r-- | active/CVE-2013-2895 | 2 | ||||
-rw-r--r-- | active/CVE-2013-2896 | 2 | ||||
-rw-r--r-- | active/CVE-2013-2897 | 2 | ||||
-rw-r--r-- | active/CVE-2013-2899 | 2 | ||||
-rw-r--r-- | active/CVE-2013-4350 | 3 | ||||
-rw-r--r-- | active/CVE-2013-4387 | 3 | ||||
-rw-r--r-- | retired/CVE-2013-2015 | 2 |
13 files changed, 13 insertions, 15 deletions
diff --git a/active/CVE-2013-0343 b/active/CVE-2013-0343 index d9451a05..fbc2f112 100644 --- a/active/CVE-2013-0343 +++ b/active/CVE-2013-0343 @@ -10,4 +10,4 @@ upstream: released (3.11) [4b08a8f1bd8cb4541c93ec170027b4d0782dab52] sid: released (3.10.11-1) 3.2-wheezy-security: released (3.2.51-1) 2.6.32-squeeze-security: needed -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-2147 b/active/CVE-2013-2147 index bacdb96d..829fad84 100644 --- a/active/CVE-2013-2147 +++ b/active/CVE-2013-2147 @@ -9,4 +9,4 @@ upstream: released (3.12-rc3)[627aad1c01da6f881e7f98d71fd928ca0c316b1a, 58f09e00 sid: released (3.11.5-1) 3.2-wheezy-security: needed 2.6.32-squeeze-security: pending (2.6.32-48squeeze5) -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-2888 b/active/CVE-2013-2888 index 177d7bf5..de5e89da 100644 --- a/active/CVE-2013-2888 +++ b/active/CVE-2013-2888 @@ -10,4 +10,4 @@ upstream: released (3.12-rc1) [43622021d2e2b82ea03d883926605bdd0525e1d1, be67b68 sid: released (3.10.11-1) 3.2-wheezy-security: released (3.2.51-1) 2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/hid-check-for-null-when-setting-values.patch, bugfix/all/hid-validate-report-id-size.patch] -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-2889 b/active/CVE-2013-2889 index abe9e32a..5749e1b2 100644 --- a/active/CVE-2013-2889 +++ b/active/CVE-2013-2889 @@ -9,4 +9,4 @@ upstream: released (3.12-rc2) [78214e81a1bf43740ce89bb5efda78eac2f8ef83, 331415f sid: released (3.11.5-1) 3.2-wheezy-security: needed 2.6.32-squeeze-security: pending (2.6.32-48squeeze5) -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-2892 b/active/CVE-2013-2892 index a8e8131c..700def89 100644 --- a/active/CVE-2013-2892 +++ b/active/CVE-2013-2892 @@ -8,4 +8,4 @@ upstream: released (3.12-rc1) [412f30105ec6735224535791eed5cdc02888ecb4] sid: released (3.10.11-1) 3.2-wheezy-security: released (3.2.51-1) 2.6.32-squeeze-security: released (2.6.32-48squeeze4) [bugfix/all/HID-pantherlord-validate-output-report-details.patch] -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-2893 b/active/CVE-2013-2893 index 59feb20f..d4988c25 100644 --- a/active/CVE-2013-2893 +++ b/active/CVE-2013-2893 @@ -9,4 +9,4 @@ upstream: released (3.12-rc2) [0fb6bd06e06792469acc15bbe427361b56ada528, 331415f sid: released (3.11.5-1) 3.2-wheezy-security: needed 2.6.32-squeeze-security: pending (2.6.32-48squeeze5) -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-2895 b/active/CVE-2013-2895 index 5daec8cf..10dd0f59 100644 --- a/active/CVE-2013-2895 +++ b/active/CVE-2013-2895 @@ -9,4 +9,4 @@ upstream: released (3.12-rc2) [297502abb32e225fb23801fcdb0e4f6f8e17099a, 331415f sid: released (3.11.5-1) 3.2-wheezy-security: needed 2.6.32-squeeze-security: N/A "Introduced in 3.2 with 534a7b8e10ec55d9f521e68c20dbb3634c25b98a" -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-2896 b/active/CVE-2013-2896 index d4cc5a62..3e4c59e7 100644 --- a/active/CVE-2013-2896 +++ b/active/CVE-2013-2896 @@ -8,4 +8,4 @@ upstream: released (3.12-rc1) [875b4e3763dbc941f15143dd1a18d10bb0be303b] sid: released (3.10.11-1) 3.2-wheezy-security: released (3.2.51-1) 2.6.32-squeeze-security: N/A "Vulnerable code not present" -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-2897 b/active/CVE-2013-2897 index ee997fcc..d75bc9f5 100644 --- a/active/CVE-2013-2897 +++ b/active/CVE-2013-2897 @@ -8,4 +8,4 @@ upstream: released (3.12-rc2) [8821f5dc187bdf16cfb32ef5aa8c3035273fa79a] sid: released (3.11.5-1) 3.2-wheezy-security: needed 2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 5519cab477b61326963c8d523520db0342862b63" -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-2899 b/active/CVE-2013-2899 index a011a2fe..f3516262 100644 --- a/active/CVE-2013-2899 +++ b/active/CVE-2013-2899 @@ -9,4 +9,4 @@ upstream: released (3.12-rc1) [1e87a2456b0227ca4ab881e19a11bb99d164e792] sid: released (3.10.11-1) 3.2-wheezy-security: released (3.2.51-1) 2.6.32-squeeze-security: N/A "Introduced in 2.6.35 with 236db47c2b3b69464d50c695ab2ddd516cf64520" -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-4350 b/active/CVE-2013-4350 index 73e4ec02..a95730d0 100644 --- a/active/CVE-2013-4350 +++ b/active/CVE-2013-4350 @@ -1,6 +1,5 @@ Description: net: sctp: fix ipv6 ipsec encryption bug in sctp_v6_xmit References: - http://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=95ee62083cb6453e056562d91f597552021e6ae7 Notes: Bugs: upstream: released (3.12-rc2) [95ee62083cb6453e056562d91f597552021e6ae7] @@ -8,4 +7,4 @@ upstream: released (3.12-rc2) [95ee62083cb6453e056562d91f597552021e6ae7] sid: released (3.11.5-1) 3.2-wheezy-security: needed 2.6.32-squeeze-security: needed -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/active/CVE-2013-4387 b/active/CVE-2013-4387 index a362152e..9ee68141 100644 --- a/active/CVE-2013-4387 +++ b/active/CVE-2013-4387 @@ -1,6 +1,5 @@ Description: linux kernel memory corruption with ipv6 udp offloading References: - https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=2811ebac2521ceac84f2bdae402455baa6a7fb47 Notes: Bugs: upstream: released (3.12-rc3) [2811ebac2521ceac84f2bdae402455baa6a7fb47] @@ -8,4 +7,4 @@ upstream: released (3.12-rc3) [2811ebac2521ceac84f2bdae402455baa6a7fb47] sid: released (3.11.5-1) 3.2-wheezy-security: needed 2.6.32-squeeze-security: needed -3.2-upstream-stable: needed +3.2-upstream-stable: pending (3.2.52) diff --git a/retired/CVE-2013-2015 b/retired/CVE-2013-2015 index 87da0034..4f129f14 100644 --- a/retired/CVE-2013-2015 +++ b/retired/CVE-2013-2015 @@ -9,4 +9,4 @@ upstream: released (3.8) [0e9a9a1ad619e7e987815d20262d36a2f95717ca] sid: released (3.8-1) 3.2-wheezy-security: released (3.2.41-2+deb7u1) [bugfix/all/ext4-make-orphan-functions-be-no-op-in-no-journal-mo.patch, bugfix/all/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch] 2.6.32-squeeze-security: released (2.6.32-48squeeze2) [bugfix/all/ext4-make-orphan-functions-be-no-op-in-no-journal-mo.patch, bugfix/all/ext4-avoid-hang-when-mounting-non-journal-filesystem.patch] -3.2-upstream-stable: +3.2-upstream-stable: pending (3.2.52) |