[kernel-sec-discuss] r2046 - active

Dann Frazier dannf at alioth.debian.org
Thu Nov 25 01:45:13 UTC 2010


Author: dannf
Date: 2010-11-25 01:45:13 +0000 (Thu, 25 Nov 2010)
New Revision: 2046

Modified:
   active/CVE-2010-2963
   active/CVE-2010-3067
   active/CVE-2010-3296
   active/CVE-2010-3297
   active/CVE-2010-3310
   active/CVE-2010-3432
   active/CVE-2010-3437
   active/CVE-2010-3442
   active/CVE-2010-3448
   active/CVE-2010-3477
   active/CVE-2010-3705
   active/CVE-2010-3858
   active/CVE-2010-3859
   active/CVE-2010-3873
   active/CVE-2010-3874
   active/CVE-2010-3875
   active/CVE-2010-3876
   active/CVE-2010-3877
   active/CVE-2010-3880
   active/CVE-2010-4072
   active/CVE-2010-4073
   active/CVE-2010-4074
   active/CVE-2010-4078
   active/CVE-2010-4079
   active/CVE-2010-4080
   active/CVE-2010-4081
   active/CVE-2010-4083
   active/CVE-2010-4157
   active/CVE-2010-4164
Log:
2.6.26-25lenny2 became 2.6.26-26lenny1


Modified: active/CVE-2010-2963
===================================================================
--- active/CVE-2010-2963	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-2963	2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
 upstream: released (2.6.36) [3e645d6]
 2.6.32-upstream-stable: released (2.6.32.25)
 linux-2.6: released (2.6.32-26)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/v4l1-fix-compat-microcode-loading-translation.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/v4l1-fix-compat-microcode-loading-translation.patch]
 2.6.32-squeeze-security: released (2.6.32-26)

Modified: active/CVE-2010-3067
===================================================================
--- active/CVE-2010-3067	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3067	2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
 upstream: released (2.6.36-rc5) [75e1c70f]
 2.6.32-upstream-stable: released (2.6.32.23)
 linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/aio-check-for-multiplication-overflow-in-do_io_submit.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/aio-check-for-multiplication-overflow-in-do_io_submit.patch]
 2.6.32-squeeze-security: released (2.6.32-24)

Modified: active/CVE-2010-3296
===================================================================
--- active/CVE-2010-3296	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3296	2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
 upstream: released (2.6.36-rc5)
 2.6.32-upstream-stable: released (2.6.32.23)
 linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/cxgb3-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/cxgb3-prevent-reading-uninitialized-stack-memory.patch]
 2.6.32-squeeze-security: released (2.6.32-24)

Modified: active/CVE-2010-3297
===================================================================
--- active/CVE-2010-3297	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3297	2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
 upstream: released (2.6.36-rc5)
 2.6.32-upstream-stable: released (2.6.32.23)
 linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-eql-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-eql-prevent-reading-uninitialized-stack-memory.patch]
 2.6.32-squeeze-security: released (2.6.32-24)

Modified: active/CVE-2010-3310
===================================================================
--- active/CVE-2010-3310	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3310	2010-11-25 01:45:13 UTC (rev 2046)
@@ -10,5 +10,5 @@
 upstream: released (2.6.36-rc6)
 2.6.32-upstream-stable: released (2.6.32.25)
 linux-2.6: released (2.6.32-25) [bugfix/all/rose-fix-signedness-issues-wrt-digi-count.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/rose-fix-signedness-issues-wrt-digi-count.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/rose-fix-signedness-issues-wrt-digi-count.patch]
 2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/rose-fix-signedness-issues-wrt-digi-count.patch]

Modified: active/CVE-2010-3432
===================================================================
--- active/CVE-2010-3432	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3432	2010-11-25 01:45:13 UTC (rev 2046)
@@ -11,5 +11,5 @@
 upstream: released (2.6.36-rc5)
 2.6.32-upstream-stable: released (2.6.32.23)
 linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/sctp-do-not-reset-the-packet-during-sctp_packet_config.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/sctp-do-not-reset-the-packet-during-sctp_packet_config.patch]
 2.6.32-squeeze-security: released (2.6.32-24)

Modified: active/CVE-2010-3437
===================================================================
--- active/CVE-2010-3437	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3437	2010-11-25 01:45:13 UTC (rev 2046)
@@ -23,5 +23,5 @@
 upstream: released (2.6.36-rc6)
 2.6.32-upstream-stable: needed
 linux-2.6: released (2.6.32-25) [bugfix/all/fix-pktcdvd-ioctl-dev_minor-range-check.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/fix-pktcdvd-ioctl-dev_minor-range-check.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/fix-pktcdvd-ioctl-dev_minor-range-check.patch]
 2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/fix-pktcdvd-ioctl-dev_minor-range-check.patch]

Modified: active/CVE-2010-3442
===================================================================
--- active/CVE-2010-3442	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3442	2010-11-25 01:45:13 UTC (rev 2046)
@@ -20,5 +20,5 @@
 upstream: released (2.6.36)
 2.6.32-upstream-stable: released (2.6.32.25)
 linux-2.6: released (2.6.32-25) [bugfix/all/alsa-prevent-heap-corruption-in-snd_ctl_new.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/alsa-prevent-heap-corruption-in-snd_ctl_new.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/alsa-prevent-heap-corruption-in-snd_ctl_new.patch]
 2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/alsa-prevent-heap-corruption-in-snd_ctl_new.patch]

Modified: active/CVE-2010-3448
===================================================================
--- active/CVE-2010-3448	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3448	2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
 upstream: released (2.6.34)
 2.6.32-upstream-stable: released (2.6.32.12)
 linux-2.6: released (2.6.32-12)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/x86/thinkpad-acpi-lock-down-video-output-state-access.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/x86/thinkpad-acpi-lock-down-video-output-state-access.patch]
 2.6.32-squeeze-security: released (2.6.32-12)

Modified: active/CVE-2010-3477
===================================================================
--- active/CVE-2010-3477	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3477	2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
 upstream: released (2.6.36-rc4) [0f04cfd0]
 2.6.32-upstream-stable: needed "dannf submitted to stable@ on 2010.10.24"
 linux-2.6: released (2.6.32-25) [bugfix/all/net-sched-fix-kernel-leak-in-act_police.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-sched-fix-kernel-leak-in-act_police.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-sched-fix-kernel-leak-in-act_police.patch]
 2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/net-sched-fix-kernel-leak-in-act_police.patch]

Modified: active/CVE-2010-3705
===================================================================
--- active/CVE-2010-3705	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3705	2010-11-25 01:45:13 UTC (rev 2046)
@@ -10,5 +10,5 @@
 upstream: released (2.6.36)
 2.6.32-upstream-stable: needed
 linux-2.6: released (2.6.32-25) [bugfix/all/sctp-fix-out-of-bounds-reading-in-sctp_assoc_get_hmac.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/sctp-fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/sctp-fix-out-of-bounds-reading-in-sctp_asoc_get_hmac.patch]
 2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/sctp-fix-out-of-bounds-reading-in-sctp_assoc_get_hmac.patch]

Modified: active/CVE-2010-3858
===================================================================
--- active/CVE-2010-3858	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3858	2010-11-25 01:45:13 UTC (rev 2046)
@@ -12,5 +12,5 @@
 upstream: released (2.6.36)
 2.6.32-upstream-stable: released (2.6.32.25)
 linux-2.6: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/setup_arg_pages-diagnose-excessive-argument-size.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/setup_arg_pages-diagnose-excessive-argument-size.patch]
 2.6.32-squeeze-security: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]

Modified: active/CVE-2010-3859
===================================================================
--- active/CVE-2010-3859	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3859	2010-11-25 01:45:13 UTC (rev 2046)
@@ -9,5 +9,5 @@
 upstream: released (2.6.37-rc1) [253eacc070b114c2ec1f81b067d2fed7305467b0 8acfe468b0384e834a303f08ebc4953d72fb690a]
 2.6.32-upstream-stable:
 linux-2.6: released (2.6.32-27)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-truncate-recvfrom-and-sendto-length-to-INT_MAX.patch, bugfix/all/net-limit-socket-io-iovec-total-length-to-INT_MAX.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-truncate-recvfrom-and-sendto-length-to-INT_MAX.patch, bugfix/all/net-limit-socket-io-iovec-total-length-to-INT_MAX.patch]
 2.6.32-squeeze-security: released (2.6.32-27)

Modified: active/CVE-2010-3873
===================================================================
--- active/CVE-2010-3873	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3873	2010-11-25 01:45:13 UTC (rev 2046)
@@ -9,5 +9,5 @@
 upstream: needed
 2.6.32-upstream-stable: needed "forwarded to stable@ on 2010.11.08"
 linux-2.6: pending (2.6.32-28) [bugfix/all/x25-Patch-to-fix-bug-15678-x25-accesses-fields-beyon.patch, bugfix/all/x25-memory-corruption-in-X.25-facilities-parsing.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/x25-fix-field-accesses-beyond-end-of-packet.patch, bugfix/all/x25-fix-memory-corruption-in-facilities-parsing.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/x25-fix-field-accesses-beyond-end-of-packet.patch, bugfix/all/x25-fix-memory-corruption-in-facilities-parsing.patch]
 2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/x25-Patch-to-fix-bug-15678-x25-accesses-fields-beyon.patch, bugfix/all/x25-memory-corruption-in-X.25-facilities-parsing.patch]

Modified: active/CVE-2010-3874
===================================================================
--- active/CVE-2010-3874	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3874	2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
 upstream: released (2.6.37-rc2) [0597d1b]
 2.6.32-upstream-stable: needed "dannf asked davem about it on 2010.11.20"
 linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/can-bcm-fix-minor-heap-overflow.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/can-bcm-fix-minor-heap-overflow.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2010-3875
===================================================================
--- active/CVE-2010-3875	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3875	2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
 upstream: released (2.6.37-rc2) [fe10ae5]
 2.6.32-upstream-stable: needed "dannf poked davem about sending to stable on 2010.11.20"
 linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-ax25-fix-information-leak-to-userland.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-ax25-fix-information-leak-to-userland.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2010-3876
===================================================================
--- active/CVE-2010-3876	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3876	2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
 upstream: released (2.6.37-rc2) [6728664]
 2.6.32-upstream-stable: needed "dannf poked davem about it on 2010.11.20"
 linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-packet-fix-information-leak-to-userland.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-packet-fix-information-leak-to-userland.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2010-3877
===================================================================
--- active/CVE-2010-3877	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3877	2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
 upstream: released (2.6.37-rc2) [88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52]
 2.6.32-upstream-stable: needed
 linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/net-tipc-fix-information-leak-to-userland.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/net-tipc-fix-information-leak-to-userland.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2010-3880
===================================================================
--- active/CVE-2010-3880	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-3880	2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
 upstream: released (2.6.37-rc2) [22e76c8]
 2.6.32-upstream-stable: needed
 linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/inet_diag-make-sure-we-actually-run-the-same-bytecode-we-audited.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/inet_diag-make-sure-we-actually-run-the-same-bytecode-we-audited.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2010-4072
===================================================================
--- active/CVE-2010-4072	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4072	2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
 upstream: released (2.6.37-rc1)
 2.6.32-upstream-stable: needed "stable@ was CCed"
 linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/ipc-shm-fix-information-leak-to-userland.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/ipc-shm-fix-information-leak-to-userland.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2010-4073
===================================================================
--- active/CVE-2010-4073	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4073	2010-11-25 01:45:13 UTC (rev 2046)
@@ -8,5 +8,5 @@
 upstream: released (2.6.37-rc1)
 2.6.32-upstream-stable: needed (stable@ was CCed)
 linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/ipc-initialize-structure-memory-to-zero-for-compat-functions.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/ipc-initialize-structure-memory-to-zero-for-compat-functions.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2010-4074
===================================================================
--- active/CVE-2010-4074	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4074	2010-11-25 01:45:13 UTC (rev 2046)
@@ -7,5 +7,5 @@
 upstream: released (2.6.36)
 2.6.32-upstream-stable: released (2.6.32.23)
 linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/usb-serial-mosfoo-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/usb-serial-mosfoo-prevent-reading-uninitialized-stack-memory.patch]
 2.6.32-squeeze-security: released (2.6.32-24)

Modified: active/CVE-2010-4078
===================================================================
--- active/CVE-2010-4078	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4078	2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
 upstream: released (2.6.36) [fd02db9de73faebc51240619c7c7f99bee9f65c7]
 2.6.32-upstream-stable: released (2.6.32.23)
 linux-2.6: released (2.6.32-24)
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/video-sis-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/video-sis-prevent-reading-uninitialized-stack-memory.patch]
 2.6.32-squeeze-security: released (2.6.32-24)

Modified: active/CVE-2010-4079
===================================================================
--- active/CVE-2010-4079	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4079	2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
 upstream: released (2.6.36) [405707985594169cfd0b1d97d29fcb4b4c6f2ac9]
 2.6.32-upstream-stable: needed
 linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/ivtvfb-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/ivtvfb-prevent-reading-uninitialized-stack-memory.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2010-4080
===================================================================
--- active/CVE-2010-4080	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4080	2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
 upstream: released (2.6.36) [e68d3b316ab7b02a074edc4f770e6a746390cb7d]
 2.6.32-upstream-stable: released (2.6.32.25)
 linux-2.6: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/rme9652-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/rme9652-prevent-reading-uninitialized-stack-memory.patch]
 2.6.32-squeeze-security: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]

Modified: active/CVE-2010-4081
===================================================================
--- active/CVE-2010-4081	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4081	2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
 upstream: released (2.6.36) [e68d3b316ab7b02a074edc4f770e6a746390cb7d]
 2.6.32-upstream-stable: released (2.6.32.25)
 linux-2.6: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/rme9652-prevent-reading-uninitialized-stack-memory.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/rme9652-prevent-reading-uninitialized-stack-memory.patch]
 2.6.32-squeeze-security: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]

Modified: active/CVE-2010-4083
===================================================================
--- active/CVE-2010-4083	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4083	2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
 upstream: released (2.6.36)
 2.6.32-upstream-stable: needed "forwarded to stable@ on 2010.11.10"
 linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/sys_semctl-fix-kernel-stack-leakage.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/sys_semctl-fix-kernel-stack-leakage.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2010-4157
===================================================================
--- active/CVE-2010-4157	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4157	2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
 upstream: released (2.6.37-rc1) [f63ae56e4e97fb12053590e41a4fa59e7daa74a4]
 2.6.32-upstream-stable: pending (2.6.32.26-rc1)
 linux-2.6: pending (2.6.32-28) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]
 2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]

Modified: active/CVE-2010-4164
===================================================================
--- active/CVE-2010-4164	2010-11-25 00:41:01 UTC (rev 2045)
+++ active/CVE-2010-4164	2010-11-25 01:45:13 UTC (rev 2046)
@@ -6,5 +6,5 @@
 upstream: pending [a6331d6]
 2.6.32-upstream-stable:
 linux-2.6: pending (2.6.32-28) [bugfix/all/x25-Prevent-crashing-when-parsing-bad-X.25-facilities.patch]
-2.6.26-lenny-security: pending (2.6.26-25lenny2) [bugfix/all/x25-prevent-crashing-when-parsing-bad-facilities.patch]
+2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/x25-prevent-crashing-when-parsing-bad-facilities.patch]
 2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/x25-Prevent-crashing-when-parsing-bad-X.25-facilities.patch]




More information about the kernel-sec-discuss mailing list