[kernel-sec-discuss] r2083 - active

Ben Hutchings benh at alioth.debian.org
Sat Dec 11 16:54:43 UTC 2010


Author: benh
Date: 2010-12-11 16:54:42 +0000 (Sat, 11 Dec 2010)
New Revision: 2083

Modified:
   active/CVE-2010-0435
   active/CVE-2010-4158
   active/CVE-2010-4162
   active/CVE-2010-4163
   active/CVE-2010-4175
   active/CVE-2010-4242
   active/CVE-2010-4248
   active/CVE-2010-4258
Log:
Update for stable releases 2.6.32.{26,27} and Debian releases 2.6.32-{28,29}

Modified: active/CVE-2010-0435
===================================================================
--- active/CVE-2010-0435	2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-0435	2010-12-11 16:54:42 UTC (rev 2083)
@@ -9,7 +9,7 @@
  jmm> combination with the plethora of KVM patches added by Red Hat?
 Bugs:
 upstream:
-2.6.32-upstream-stable: pending (2.6.32.27)
-linux-2.6: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
 2.6.26-lenny-security:
-2.6.32-squeeze-security: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]

Modified: active/CVE-2010-4158
===================================================================
--- active/CVE-2010-4158	2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4158	2010-12-11 16:54:42 UTC (rev 2083)
@@ -8,6 +8,6 @@
 Bugs:
 upstream: released (2.6.37-rc2) [57fe93b374a6b8711995c2d466c502af9f3a08bb]
 2.6.32-upstream-stable: needed
-linux-2.6: needed
+linux-2.6: released (2.6.32-29) [bugfix/all/filter-make-sure-filters-dont-read-uninitialized-memory.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/filter-make-sure-filters-dont-read-uninitialized-memory.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/filter-make-sure-filters-dont-read-uninitialized-memory.patch]

Modified: active/CVE-2010-4162
===================================================================
--- active/CVE-2010-4162	2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4162	2010-12-11 16:54:42 UTC (rev 2083)
@@ -5,7 +5,7 @@
 Notes:
 Bugs:
 upstream: needed
-2.6.32-upstream-stable: pending (2.6.32.27)
-linux-2.6: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/bio-take-care-not-overflow-page-count-when-mapping-copying-user-data.patch]
-2.6.32-squeeze-security: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]

Modified: active/CVE-2010-4163
===================================================================
--- active/CVE-2010-4163	2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4163	2010-12-11 16:54:42 UTC (rev 2083)
@@ -6,7 +6,7 @@
  Also needs https://patchwork.kernel.org/patch/363282/
 Bugs:
 upstream: needed
-2.6.32-upstream-stable: pending (2.6.32.27)
-linux-2.6: pending (2.6.32-29) [debian/patches/bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-29) [debian/patches/bugfix/all/stable/2.6.32.27.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/block-check-for-proper-length-of-iov-entries-in-blk_rq_map_user_iov.patch]
-2.6.32-squeeze-security: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]

Modified: active/CVE-2010-4175
===================================================================
--- active/CVE-2010-4175	2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4175	2010-12-11 16:54:42 UTC (rev 2083)
@@ -5,7 +5,7 @@
 Notes:
 Bugs:
 upstream: released (2.6.37-rc3) [218854af84038d828a32f061858b1902ed2beec6]
-2.6.32-upstream-stable:
-linux-2.6:
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-28) [bugfix/all/rds-Integer-overflow-in-RDS-cmsg-handling.patch]
 2.6.26-lenny-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/rds-Integer-overflow-in-RDS-cmsg-handling.patch]

Modified: active/CVE-2010-4242
===================================================================
--- active/CVE-2010-4242	2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4242	2010-12-11 16:54:42 UTC (rev 2083)
@@ -6,7 +6,7 @@
 Notes:
 Bugs:
 upstream:
-2.6.32-upstream-stable:
-linux-2.6:
+2.6.32-upstream-stable: released (2.6.36.26)
+linux-2.6: released (2.6.32-28) [bugfix/all/stable/2.6.32.26.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/bluetooth-fix-missing-NULL-check.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/stable/2.6.32.26.patch]

Modified: active/CVE-2010-4248
===================================================================
--- active/CVE-2010-4248	2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4248	2010-12-11 16:54:42 UTC (rev 2083)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.37-rc2) [e0a70217107e6f9844628120412cb27bb4cea194]
 2.6.32-upstream-stable:
-linux-2.6:
+linux-2.6: released (2.6.32-29) [bugfix/all/posix-cpu-timers-workaround-to-suppress-the-problems-with-mt-exec.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/posix-cpu-timers-workaround-to-suppress-the-problems-with-mt-exec.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/posix-cpu-timers-workaround-to-suppress-the-problems-with-mt-exec.patch]

Modified: active/CVE-2010-4258
===================================================================
--- active/CVE-2010-4258	2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4258	2010-12-11 16:54:42 UTC (rev 2083)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.37-rc4) [33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177]
 2.6.32-upstream-stable: released (2.6.32.27)
-linux-2.6: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
 2.6.26-lenny-security: needed
-2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]




More information about the kernel-sec-discuss mailing list