[kernel-sec-discuss] r2046 - active
Dann Frazier
dannf at alioth.debian.org
Thu Nov 25 01:45:13 UTC 2010
Author: dannf
Date: 2010-11-25 01:45:13 +0000 (Thu, 25 Nov 2010)
New Revision: 2046
Modified:
active/CVE-2010-2963
active/CVE-2010-3067
active/CVE-2010-3296
active/CVE-2010-3297
active/CVE-2010-3310
active/CVE-2010-3432
active/CVE-2010-3437
active/CVE-2010-3442
active/CVE-2010-3448
active/CVE-2010-3477
active/CVE-2010-3705
active/CVE-2010-3858
active/CVE-2010-3859
active/CVE-2010-3873
active/CVE-2010-3874
active/CVE-2010-3875
active/CVE-2010-3876
active/CVE-2010-3877
active/CVE-2010-3880
active/CVE-2010-4072
active/CVE-2010-4073
active/CVE-2010-4074
active/CVE-2010-4078
active/CVE-2010-4079
active/CVE-2010-4080
active/CVE-2010-4081
active/CVE-2010-4083
active/CVE-2010-4157
active/CVE-2010-4164
Log:
2.6.26-25lenny2 became 2.6.26-26lenny1
Modified: active/CVE-2010-2963
===================================================================
--- active/CVE-2010-2963 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-2963 2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
upstream: released (2.6.36) [3e645d6]
2.6.32-upstream-stable: released (2.6.32.25)
linux-2.6: released (2.6.32-26)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/v4l1-fix-compat-microcode-loading-translation.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/v4l1-fix-compat-microcode-loading-translation.patch]
2.6.32-squeeze-security: released (2.6.32-26)
Modified: active/CVE-2010-3067
===================================================================
--- active/CVE-2010-3067 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3067 2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
upstream: released (2.6.36-rc5) [75e1c70f]
2.6.32-upstream-stable: released (2.6.32.23)
linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/aio-check-for-multiplication-overflow-in-do_io_submit.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/aio-check-for-multiplication-overflow-in-do_io_submit.patch]
2.6.32-squeeze-security: released (2.6.32-24)
Modified: active/CVE-2010-3296
===================================================================
--- active/CVE-2010-3296 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3296 2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
upstream: released (2.6.36-rc5)
2.6.32-upstream-stable: released (2.6.32.23)
linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/cxgb3-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/cxgb3-prevent-reading-uninitialized-stack-memory.patch]
2.6.32-squeeze-security: released (2.6.32-24)
Modified: active/CVE-2010-3297
===================================================================
--- active/CVE-2010-3297 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3297 2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
upstream: released (2.6.36-rc5)
2.6.32-upstream-stable: released (2.6.32.23)
linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-eql-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-eql-prevent-reading-uninitialized-stack-memory.patch]
2.6.32-squeeze-security: released (2.6.32-24)
Modified: active/CVE-2010-3310
===================================================================
--- active/CVE-2010-3310 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3310 2010-11-25 01:45:13 UTC (rev 2046)
@@ -10,5 +10,5 @@
upstream: released (2.6.36-rc6)
2.6.32-upstream-stable: released (2.6.32.25)
linux-2.6: released (2.6.32-25) [bugfix/all/rose-fix-signedness-issues-wrt-digi-count.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/rose-fix-signedness-issues-wrt-digi-count.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/rose-fix-signedness-issues-wrt-digi-count.patch]
2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/rose-fix-signedness-issues-wrt-digi-count.patch]
Modified: active/CVE-2010-3432
===================================================================
--- active/CVE-2010-3432 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3432 2010-11-25 01:45:13 UTC (rev 2046)
@@ -11,5 +11,5 @@
upstream: released (2.6.36-rc5)
2.6.32-upstream-stable: released (2.6.32.23)
linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/sctp-do-not-reset-the-packet-during-sctp_packet_config.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/sctp-do-not-reset-the-packet-during-sctp_packet_config.patch]
2.6.32-squeeze-security: released (2.6.32-24)
Modified: active/CVE-2010-3437
===================================================================
--- active/CVE-2010-3437 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3437 2010-11-25 01:45:13 UTC (rev 2046)
@@ -23,5 +23,5 @@
upstream: released (2.6.36-rc6)
2.6.32-upstream-stable: needed
linux-2.6: released (2.6.32-25) [bugfix/all/fix-pktcdvd-ioctl-dev_minor-range-check.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/fix-pktcdvd-ioctl-dev_minor-range-check.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/fix-pktcdvd-ioctl-dev_minor-range-check.patch]
2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/fix-pktcdvd-ioctl-dev_minor-range-check.patch]
Modified: active/CVE-2010-3442
===================================================================
--- active/CVE-2010-3442 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3442 2010-11-25 01:45:13 UTC (rev 2046)
@@ -20,5 +20,5 @@
upstream: released (2.6.36)
2.6.32-upstream-stable: released (2.6.32.25)
linux-2.6: released (2.6.32-25) [bugfix/all/alsa-prevent-heap-corruption-in-snd_ctl_new.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/alsa-prevent-heap-corruption-in-snd_ctl_new.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/alsa-prevent-heap-corruption-in-snd_ctl_new.patch]
2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/alsa-prevent-heap-corruption-in-snd_ctl_new.patch]
Modified: active/CVE-2010-3448
===================================================================
--- active/CVE-2010-3448 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3448 2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
upstream: released (2.6.34)
2.6.32-upstream-stable: released (2.6.32.12)
linux-2.6: released (2.6.32-12)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/x86/thinkpad-acpi-lock-down-video-output-state-access.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/x86/thinkpad-acpi-lock-down-video-output-state-access.patch]
2.6.32-squeeze-security: released (2.6.32-12)
Modified: active/CVE-2010-3477
===================================================================
--- active/CVE-2010-3477 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3477 2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
upstream: released (2.6.36-rc4) [0f04cfd0]
2.6.32-upstream-stable: needed "dannf submitted to stable@ on 2010.10.24"
linux-2.6: released (2.6.32-25) [bugfix/all/net-sched-fix-kernel-leak-in-act_police.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-sched-fix-kernel-leak-in-act_police.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-sched-fix-kernel-leak-in-act_police.patch]
2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/net-sched-fix-kernel-leak-in-act_police.patch]
Modified: active/CVE-2010-3705
===================================================================
--- active/CVE-2010-3705 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3705 2010-11-25 01:45:13 UTC (rev 2046)
@@ -10,5 +10,5 @@
upstream: released (2.6.36)
2.6.32-upstream-stable: needed
linux-2.6: released (2.6.32-25) [bugfix/all/sctp-fix-out-of-bounds-reading-in-sctp_assoc_get_hmac.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/sctp-fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/sctp-fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.patch]
2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/sctp-fix-out-of-bounds-reading-in-sctp_assoc_get_hmac.patch]
Modified: active/CVE-2010-3858
===================================================================
--- active/CVE-2010-3858 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3858 2010-11-25 01:45:13 UTC (rev 2046)
@@ -12,5 +12,5 @@
upstream: released (2.6.36)
2.6.32-upstream-stable: released (2.6.32.25)
linux-2.6: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/setup_arg_pages-diagnose-excessive-argument-size.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/setup_arg_pages-diagnose-excessive-argument-size.patch]
2.6.32-squeeze-security: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]
Modified: active/CVE-2010-3859
===================================================================
--- active/CVE-2010-3859 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3859 2010-11-25 01:45:13 UTC (rev 2046)
@@ -9,5 +9,5 @@
upstream: released (2.6.37-rc1) [253eacc070b114c2ec1f81b067d2fed7305467b0 8acfe468b0384e834a303f08ebc4953d72fb690a]
2.6.32-upstream-stable:
linux-2.6: released (2.6.32-27)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-truncate-recvfrom-and-sendto-length-to-INT_MAX.patch, bugfix/all/net-limit-socket-io-iovec-total-length-to-INT_MAX.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-truncate-recvfrom-and-sendto-length-to-INT_MAX.patch, bugfix/all/net-limit-socket-io-iovec-total-length-to-INT_MAX.patch]
2.6.32-squeeze-security: released (2.6.32-27)
Modified: active/CVE-2010-3873
===================================================================
--- active/CVE-2010-3873 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3873 2010-11-25 01:45:13 UTC (rev 2046)
@@ -9,5 +9,5 @@
upstream: needed
2.6.32-upstream-stable: needed "forwarded to stable@ on 2010.11.08"
linux-2.6: pending (2.6.32-28) [bugfix/all/x25-Patch-to-fix-bug-15678-x25-accesses-fields-beyon.patch, bugfix/all/x25-memory-corruption-in-X.25-facilities-parsing.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/x25-fix-field-accesses-beyond-end-of-packet.patch, bugfix/all/x25-fix-memory-corruption-in-facilities-parsing.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/x25-fix-field-accesses-beyond-end-of-packet.patch, bugfix/all/x25-fix-memory-corruption-in-facilities-parsing.patch]
2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/x25-Patch-to-fix-bug-15678-x25-accesses-fields-beyon.patch, bugfix/all/x25-memory-corruption-in-X.25-facilities-parsing.patch]
Modified: active/CVE-2010-3874
===================================================================
--- active/CVE-2010-3874 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3874 2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
upstream: released (2.6.37-rc2) [0597d1b]
2.6.32-upstream-stable: needed "dannf asked davem about it on 2010.11.20"
linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/can-bcm-fix-minor-heap-overflow.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/can-bcm-fix-minor-heap-overflow.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2010-3875
===================================================================
--- active/CVE-2010-3875 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3875 2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
upstream: released (2.6.37-rc2) [fe10ae5]
2.6.32-upstream-stable: needed "dannf poked davem about sending to stable on 2010.11.20"
linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-ax25-fix-information-leak-to-userland.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-ax25-fix-information-leak-to-userland.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2010-3876
===================================================================
--- active/CVE-2010-3876 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3876 2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
upstream: released (2.6.37-rc2) [6728664]
2.6.32-upstream-stable: needed "dannf poked davem about it on 2010.11.20"
linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-packet-fix-information-leak-to-userland.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-packet-fix-information-leak-to-userland.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2010-3877
===================================================================
--- active/CVE-2010-3877 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3877 2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
upstream: released (2.6.37-rc2) [88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52]
2.6.32-upstream-stable: needed
linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-tipc-fix-information-leak-to-userland.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-tipc-fix-information-leak-to-userland.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2010-3880
===================================================================
--- active/CVE-2010-3880 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3880 2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
upstream: released (2.6.37-rc2) [22e76c8]
2.6.32-upstream-stable: needed
linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/inet_diag-make-sure-we-actually-run-the-same-bytecode-we-audited.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/inet_diag-make-sure-we-actually-run-the-same-bytecode-we-audited.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2010-4072
===================================================================
--- active/CVE-2010-4072 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4072 2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
upstream: released (2.6.37-rc1)
2.6.32-upstream-stable: needed "stable@ was CCed"
linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/ipc-shm-fix-information-leak-to-userland.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/ipc-shm-fix-information-leak-to-userland.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2010-4073
===================================================================
--- active/CVE-2010-4073 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4073 2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
upstream: released (2.6.37-rc1)
2.6.32-upstream-stable: needed (stable@ was CCed)
linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/ipc-initialize-structure-memory-to-zero-for-compat-functions.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/ipc-initialize-structure-memory-to-zero-for-compat-functions.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2010-4074
===================================================================
--- active/CVE-2010-4074 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4074 2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
upstream: released (2.6.36)
2.6.32-upstream-stable: released (2.6.32.23)
linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/usb-serial-mosfoo-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/usb-serial-mosfoo-prevent-reading-uninitialized-stack-memory.patch]
2.6.32-squeeze-security: released (2.6.32-24)
Modified: active/CVE-2010-4078
===================================================================
--- active/CVE-2010-4078 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4078 2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
upstream: released (2.6.36) [fd02db9de73faebc51240619c7c7f99bee9f65c7]
2.6.32-upstream-stable: released (2.6.32.23)
linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/video-sis-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/video-sis-prevent-reading-uninitialized-stack-memory.patch]
2.6.32-squeeze-security: released (2.6.32-24)
Modified: active/CVE-2010-4079
===================================================================
--- active/CVE-2010-4079 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4079 2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
upstream: released (2.6.36) [405707985594169cfd0b1d97d29fcb4b4c6f2ac9]
2.6.32-upstream-stable: needed
linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/ivtvfb-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/ivtvfb-prevent-reading-uninitialized-stack-memory.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2010-4080
===================================================================
--- active/CVE-2010-4080 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4080 2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
upstream: released (2.6.36) [e68d3b316ab7b02a074edc4f770e6a746390cb7d]
2.6.32-upstream-stable: released (2.6.32.25)
linux-2.6: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/rme9652-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/rme9652-prevent-reading-uninitialized-stack-memory.patch]
2.6.32-squeeze-security: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]
Modified: active/CVE-2010-4081
===================================================================
--- active/CVE-2010-4081 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4081 2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
upstream: released (2.6.36) [e68d3b316ab7b02a074edc4f770e6a746390cb7d]
2.6.32-upstream-stable: released (2.6.32.25)
linux-2.6: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/rme9652-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/rme9652-prevent-reading-uninitialized-stack-memory.patch]
2.6.32-squeeze-security: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]
Modified: active/CVE-2010-4083
===================================================================
--- active/CVE-2010-4083 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4083 2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
upstream: released (2.6.36)
2.6.32-upstream-stable: needed "forwarded to stable@ on 2010.11.10"
linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/sys_semctl-fix-kernel-stack-leakage.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/sys_semctl-fix-kernel-stack-leakage.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2010-4157
===================================================================
--- active/CVE-2010-4157 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4157 2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
upstream: released (2.6.37-rc1) [f63ae56e4e97fb12053590e41a4fa59e7daa74a4]
2.6.32-upstream-stable: pending (2.6.32.26-rc1)
linux-2.6: pending (2.6.32-28) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]
2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]
Modified: active/CVE-2010-4164
===================================================================
--- active/CVE-2010-4164 2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4164 2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
upstream: pending [a6331d6]
2.6.32-upstream-stable:
linux-2.6: pending (2.6.32-28) [bugfix/all/x25-Prevent-crashing-when-parsing-bad-X.25-facilities.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/x25-prevent-crashing-when-parsing-bad-facilities.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/x25-prevent-crashing-when-parsing-bad-facilities.patch]
2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/x25-Prevent-crashing-when-parsing-bad-X.25-facilities.patch]
More information about the kernel-sec-discuss
mailing list