[kernel-sec-discuss] r1827 - active
Dann Frazier
dannf at alioth.debian.org
Sat May 8 17:52:42 UTC 2010
Author: dannf
Date: 2010-05-08 17:52:42 +0000 (Sat, 08 May 2010)
New Revision: 1827
Modified:
active/CVE-2009-4537
active/CVE-2010-0727
active/CVE-2010-1083
active/CVE-2010-1084
active/CVE-2010-1086
active/CVE-2010-1087
active/CVE-2010-1088
active/CVE-2010-1162
active/CVE-2010-1173
active/CVE-2010-1187
active/CVE-2010-1451
Log:
changes queued for 21lenny5 are now requeued for 22lenny1
Modified: active/CVE-2009-4537
===================================================================
--- active/CVE-2009-4537 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2009-4537 2010-05-08 17:52:42 UTC (rev 1827)
@@ -13,5 +13,5 @@
upstream: released (2.6.34-rc3) [c0cd884a]
2.6.32-upstream-stable: needed
linux-2.6: released (2.6.32-11) [bugfix/all/net-r8169-improved-rx-length-check-errors.patch]
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/all/net-r8169-improved-rx-length-check-errors.patch, bugfix/all/r8169-offical-fix-for-cve-2009-4537-overlength-frame-dmas.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/all/net-r8169-improved-rx-length-check-errors.patch, bugfix/all/r8169-offical-fix-for-cve-2009-4537-overlength-frame-dmas.patch]
2.6.32-squeeze-security: released (2.6.32-11) [bugfix/all/net-r8169-improved-rx-length-check-errors.patch]
Modified: active/CVE-2010-0727
===================================================================
--- active/CVE-2010-0727 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2010-0727 2010-05-08 17:52:42 UTC (rev 1827)
@@ -10,5 +10,5 @@
upstream: released (2.6.34-rc2) [720e77492]
2.6.32-upstream-stable: released (2.6.32.11) [788b99c4]
linux-2.6: released (2.6.32-11) [bugfix/all/stable/2.6.32.11.patch]
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/all/gfs2-skip-check-for-mandatory-locks-when-unlocking.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/all/gfs2-skip-check-for-mandatory-locks-when-unlocking.patch]
2.6.32-squeeze-security: released (2.6.32-11) [bugfix/all/stable/2.6.32.11.patch]
Modified: active/CVE-2010-1083
===================================================================
--- active/CVE-2010-1083 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2010-1083 2010-05-08 17:52:42 UTC (rev 1827)
@@ -7,5 +7,5 @@
upstream: released (2.6.33)
2.6.32-upstream-stable: released (2.6.32.9)
linux-2.6: released (2.6.32-9)
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/all/usbfs-only-copy-received-data.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/all/usbfs-only-copy-received-data.patch]
2.6.32-squeeze-security: released (2.6.32-9)
Modified: active/CVE-2010-1084
===================================================================
--- active/CVE-2010-1084 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2010-1084 2010-05-08 17:52:42 UTC (rev 1827)
@@ -8,5 +8,5 @@
upstream: released (2.6.34-rc3) [101545f6]
2.6.32-upstream-stable: released (2.6.32.11) [e1c20f72]
linux-2.6: released (2.6.32-11) [bugfix/all/stable/2.6.32.11.patch]
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/all/bluetooth-fix-potential-bad-memory-access-with-sysfs-files.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/all/bluetooth-fix-potential-bad-memory-access-with-sysfs-files.patch]
2.6.32-squeeze-security: released (2.6.32-11) [bugfix/all/stable/2.6.32.11.patch]
Modified: active/CVE-2010-1086
===================================================================
--- active/CVE-2010-1086 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2010-1086 2010-05-08 17:52:42 UTC (rev 1827)
@@ -7,5 +7,5 @@
upstream: released (2.6.32.10)
2.6.32-upstream-stable: released (2.6.32.10)
linux-2.6: released (2.6.32-10)
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/all/dvb-core-fix-dos-in-ule-decapsulation.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/all/dvb-core-fix-dos-in-ule-decapsulation.patch]
2.6.32-squeeze-security: released (2.6.32-10)
Modified: active/CVE-2010-1087
===================================================================
--- active/CVE-2010-1087 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2010-1087 2010-05-08 17:52:42 UTC (rev 1827)
@@ -7,5 +7,5 @@
upstream: released (2.6.33)
2.6.32-upstream-stable: released (2.6.32.9)
linux-2.6: released (2.6.32-9)
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/all/nfs-fix-an-oops-when-truncating-a-file.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/all/nfs-fix-an-oops-when-truncating-a-file.patch]
2.6.32-squeeze-security: released (2.6.32-9)
Modified: active/CVE-2010-1088
===================================================================
--- active/CVE-2010-1088 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2010-1088 2010-05-08 17:52:42 UTC (rev 1827)
@@ -7,5 +7,5 @@
upstream: released (2.6.32.10)
2.6.32-upstream-stable: released (2.6.32.10)
linux-2.6: released (2.6.32-10)
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/all/fix-LOOKUP_FOLLOW-on-automount-symlinks.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/all/fix-LOOKUP_FOLLOW-on-automount-symlinks.patch]
2.6.32-squeeze-security: released (2.6.32-10)
Modified: active/CVE-2010-1162
===================================================================
--- active/CVE-2010-1162 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2010-1162 2010-05-08 17:52:42 UTC (rev 1827)
@@ -8,5 +8,5 @@
upstream: released (2.6.34-rc4) [6da8d866]
2.6.32-upstream-stable: released (2.6.32.12) [e2278e63]
linux-2.6: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/all/tty-release_one_tty-forgets-to-put-pids.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/all/tty-release_one_tty-forgets-to-put-pids.patch]
2.6.32-squeeze-security: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
Modified: active/CVE-2010-1173
===================================================================
--- active/CVE-2010-1173 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2010-1173 2010-05-08 17:52:42 UTC (rev 1827)
@@ -8,5 +8,5 @@
upstream:
2.6.32-upstream-stable:
linux-2.6: released (2.6.32-12) [bugfix/all/sctp-fix-skb_over_panic-resulting-from-multiple-invalid-parameter-errors.patch]
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/all/sctp-fix-skb_over_panic-resulting-from-multiple-invalid-parameter-errors.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/all/sctp-fix-skb_over_panic-resulting-from-multiple-invalid-parameter-errors.patch]
2.6.32-squeeze-security: released (2.6.32-12) [bugfix/all/sctp-fix-skb_over_panic-resulting-from-multiple-invalid-parameter-errors.patch]
Modified: active/CVE-2010-1187
===================================================================
--- active/CVE-2010-1187 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2010-1187 2010-05-08 17:52:42 UTC (rev 1827)
@@ -8,5 +8,5 @@
upstream: released (2.6.34-rc2) [d0021b25]
2.6.32-upstream-stable: needed
linux-2.6: released (2.6.32-12) [bugfix/all/tipc-fix-oops-on-send-prior-to-entering-networked-mode.patch]
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/all/tipc-fix-oops-on-send-prior-to-entering-networked-mode.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/all/tipc-fix-oops-on-send-prior-to-entering-networked-mode.patch]
2.6.32-squeeze-security: released (2.6.32-12) [bugfix/all/tipc-fix-oops-on-send-prior-to-entering-networked-mode.patch]
Modified: active/CVE-2010-1451
===================================================================
--- active/CVE-2010-1451 2010-05-06 03:52:15 UTC (rev 1826)
+++ active/CVE-2010-1451 2010-05-08 17:52:42 UTC (rev 1827)
@@ -9,5 +9,5 @@
upstream:
2.6.32-upstream-stable: released (2.6.32.10)
linux-2.6: released (2.6.32-10) [bugfix/all/stable/2.6.32.10.patch]
-2.6.26-lenny-security: pending (2.6.26-21lenny5) [bugfix/sparc/fix-sun4u-execute-bit-check-in-TSB-I-ITLB-load.patch]
+2.6.26-lenny-security: pending (2.6.26-22lenny1) [bugfix/sparc/fix-sun4u-execute-bit-check-in-TSB-I-ITLB-load.patch]
2.6.32-squeeze-security: released (2.6.32-10) [bugfix/all/stable/2.6.32.10.patch]
More information about the kernel-sec-discuss
mailing list