[kernel-sec-discuss] r2083 - active
Ben Hutchings
benh at alioth.debian.org
Sat Dec 11 16:54:43 UTC 2010
Author: benh
Date: 2010-12-11 16:54:42 +0000 (Sat, 11 Dec 2010)
New Revision: 2083
Modified:
active/CVE-2010-0435
active/CVE-2010-4158
active/CVE-2010-4162
active/CVE-2010-4163
active/CVE-2010-4175
active/CVE-2010-4242
active/CVE-2010-4248
active/CVE-2010-4258
Log:
Update for stable releases 2.6.32.{26,27} and Debian releases 2.6.32-{28,29}
Modified: active/CVE-2010-0435
===================================================================
--- active/CVE-2010-0435 2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-0435 2010-12-11 16:54:42 UTC (rev 2083)
@@ -9,7 +9,7 @@
jmm> combination with the plethora of KVM patches added by Red Hat?
Bugs:
upstream:
-2.6.32-upstream-stable: pending (2.6.32.27)
-linux-2.6: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
2.6.26-lenny-security:
-2.6.32-squeeze-security: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
Modified: active/CVE-2010-4158
===================================================================
--- active/CVE-2010-4158 2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4158 2010-12-11 16:54:42 UTC (rev 2083)
@@ -8,6 +8,6 @@
Bugs:
upstream: released (2.6.37-rc2) [57fe93b374a6b8711995c2d466c502af9f3a08bb]
2.6.32-upstream-stable: needed
-linux-2.6: needed
+linux-2.6: released (2.6.32-29) [bugfix/all/filter-make-sure-filters-dont-read-uninitialized-memory.patch]
2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/filter-make-sure-filters-dont-read-uninitialized-memory.patch]
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/filter-make-sure-filters-dont-read-uninitialized-memory.patch]
Modified: active/CVE-2010-4162
===================================================================
--- active/CVE-2010-4162 2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4162 2010-12-11 16:54:42 UTC (rev 2083)
@@ -5,7 +5,7 @@
Notes:
Bugs:
upstream: needed
-2.6.32-upstream-stable: pending (2.6.32.27)
-linux-2.6: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/bio-take-care-not-overflow-page-count-when-mapping-copying-user-data.patch]
-2.6.32-squeeze-security: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
Modified: active/CVE-2010-4163
===================================================================
--- active/CVE-2010-4163 2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4163 2010-12-11 16:54:42 UTC (rev 2083)
@@ -6,7 +6,7 @@
Also needs https://patchwork.kernel.org/patch/363282/
Bugs:
upstream: needed
-2.6.32-upstream-stable: pending (2.6.32.27)
-linux-2.6: pending (2.6.32-29) [debian/patches/bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-29) [debian/patches/bugfix/all/stable/2.6.32.27.patch]
2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/block-check-for-proper-length-of-iov-entries-in-blk_rq_map_user_iov.patch]
-2.6.32-squeeze-security: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
Modified: active/CVE-2010-4175
===================================================================
--- active/CVE-2010-4175 2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4175 2010-12-11 16:54:42 UTC (rev 2083)
@@ -5,7 +5,7 @@
Notes:
Bugs:
upstream: released (2.6.37-rc3) [218854af84038d828a32f061858b1902ed2beec6]
-2.6.32-upstream-stable:
-linux-2.6:
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-28) [bugfix/all/rds-Integer-overflow-in-RDS-cmsg-handling.patch]
2.6.26-lenny-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/rds-Integer-overflow-in-RDS-cmsg-handling.patch]
Modified: active/CVE-2010-4242
===================================================================
--- active/CVE-2010-4242 2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4242 2010-12-11 16:54:42 UTC (rev 2083)
@@ -6,7 +6,7 @@
Notes:
Bugs:
upstream:
-2.6.32-upstream-stable:
-linux-2.6:
+2.6.32-upstream-stable: released (2.6.36.26)
+linux-2.6: released (2.6.32-28) [bugfix/all/stable/2.6.32.26.patch]
2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/bluetooth-fix-missing-NULL-check.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/stable/2.6.32.26.patch]
Modified: active/CVE-2010-4248
===================================================================
--- active/CVE-2010-4248 2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4248 2010-12-11 16:54:42 UTC (rev 2083)
@@ -5,6 +5,6 @@
Bugs:
upstream: released (2.6.37-rc2) [e0a70217107e6f9844628120412cb27bb4cea194]
2.6.32-upstream-stable:
-linux-2.6:
+linux-2.6: released (2.6.32-29) [bugfix/all/posix-cpu-timers-workaround-to-suppress-the-problems-with-mt-exec.patch]
2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/posix-cpu-timers-workaround-to-suppress-the-problems-with-mt-exec.patch]
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/posix-cpu-timers-workaround-to-suppress-the-problems-with-mt-exec.patch]
Modified: active/CVE-2010-4258
===================================================================
--- active/CVE-2010-4258 2010-12-11 16:53:50 UTC (rev 2082)
+++ active/CVE-2010-4258 2010-12-11 16:54:42 UTC (rev 2083)
@@ -7,6 +7,6 @@
Bugs:
upstream: released (2.6.37-rc4) [33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177]
2.6.32-upstream-stable: released (2.6.32.27)
-linux-2.6: pending (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
2.6.26-lenny-security: needed
-2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27-rc1.patch]
+2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
More information about the kernel-sec-discuss
mailing list