[kernel-sec-discuss] r2049 - active

Ben Hutchings benh at alioth.debian.org
Thu Nov 25 16:55:04 UTC 2010


Author: benh
Date: 2010-11-25 16:55:04 +0000 (Thu, 25 Nov 2010)
New Revision: 2049

Modified:
   active/CVE-2010-3698
   active/CVE-2010-3848
   active/CVE-2010-3849
   active/CVE-2010-3850
   active/CVE-2010-3873
   active/CVE-2010-4157
   active/CVE-2010-4164
   active/CVE-2010-4165
Log:
Update for release of stable update 2.6.32.26 and Debian version 2.6.32-28

Modified: active/CVE-2010-3698
===================================================================
--- active/CVE-2010-3698	2010-11-25 15:40:57 UTC (rev 2048)
+++ active/CVE-2010-3698	2010-11-25 16:55:04 UTC (rev 2049)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (2.6.36) [9581d442b9058d3699b4be568b6e5eae38a41493]
-2.6.32-upstream-stable: pending (2.6.32.26-rc1)
-linux-2.6: pending (2.6.32-28) [bugfix/x86/KVM-Fix-fs-gs-reload-oops-with-invalid-ldt.patch]
+2.6.32-upstream-stable: released (2.6.32.26)
+linux-2.6: released (2.6.32-28) [bugfix/all/stable/2.6.32.26.patch]
 2.6.26-lenny-security: N/A "code not present"
-2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/x86/KVM-Fix-fs-gs-reload-oops-with-invalid-ldt.patch]
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/stable/2.6.32.26.patch]

Modified: active/CVE-2010-3848
===================================================================
--- active/CVE-2010-3848	2010-11-25 15:40:57 UTC (rev 2048)
+++ active/CVE-2010-3848	2010-11-25 16:55:04 UTC (rev 2049)
@@ -6,6 +6,6 @@
 Bugs:
 upstream:
 2.6.32-upstream-stable:
-linux-2.6: pending (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
+linux-2.6: released (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
-2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]

Modified: active/CVE-2010-3849
===================================================================
--- active/CVE-2010-3849	2010-11-25 15:40:57 UTC (rev 2048)
+++ active/CVE-2010-3849	2010-11-25 16:55:04 UTC (rev 2049)
@@ -6,6 +6,6 @@
 Bugs:
 upstream:
 2.6.32-upstream-stable:
-linux-2.6: pending (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
+linux-2.6: released (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
-2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]

Modified: active/CVE-2010-3850
===================================================================
--- active/CVE-2010-3850	2010-11-25 15:40:57 UTC (rev 2048)
+++ active/CVE-2010-3850	2010-11-25 16:55:04 UTC (rev 2049)
@@ -6,6 +6,6 @@
 Bugs:
 upstream:
 2.6.32-upstream-stable:
-linux-2.6: pending (2.6.32-28) [bugfix/all/econet-fix-redeclaration-of-symbol-len.patch, bugfix/all/econet-coalesced-iovec.patch]
+linux-2.6: released (2.6.32-28) [bugfix/all/econet-fix-redeclaration-of-symbol-len.patch, bugfix/all/econet-coalesced-iovec.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/econet-fix-redeclaration-of-symbol-len.patch, bugfix/all/econet-coalesced-iovec.patch]
-2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/econet-fix-redeclaration-of-symbol-len.patch, bugfix/all/econet-coalesced-iovec.patch]
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/econet-fix-redeclaration-of-symbol-len.patch, bugfix/all/econet-coalesced-iovec.patch]

Modified: active/CVE-2010-3873
===================================================================
--- active/CVE-2010-3873	2010-11-25 15:40:57 UTC (rev 2048)
+++ active/CVE-2010-3873	2010-11-25 16:55:04 UTC (rev 2049)
@@ -8,6 +8,6 @@
 Bugs:
 upstream: needed
 2.6.32-upstream-stable: needed "forwarded to stable@ on 2010.11.08"
-linux-2.6: pending (2.6.32-28) [bugfix/all/x25-Patch-to-fix-bug-15678-x25-accesses-fields-beyon.patch, bugfix/all/x25-memory-corruption-in-X.25-facilities-parsing.patch]
+linux-2.6: released (2.6.32-28) [bugfix/all/x25-Patch-to-fix-bug-15678-x25-accesses-fields-beyon.patch, bugfix/all/x25-memory-corruption-in-X.25-facilities-parsing.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/x25-fix-field-accesses-beyond-end-of-packet.patch, bugfix/all/x25-fix-memory-corruption-in-facilities-parsing.patch]
-2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/x25-Patch-to-fix-bug-15678-x25-accesses-fields-beyon.patch, bugfix/all/x25-memory-corruption-in-X.25-facilities-parsing.patch]
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/x25-Patch-to-fix-bug-15678-x25-accesses-fields-beyon.patch, bugfix/all/x25-memory-corruption-in-X.25-facilities-parsing.patch]

Modified: active/CVE-2010-4157
===================================================================
--- active/CVE-2010-4157	2010-11-25 15:40:57 UTC (rev 2048)
+++ active/CVE-2010-4157	2010-11-25 16:55:04 UTC (rev 2049)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (2.6.37-rc1) [f63ae56e4e97fb12053590e41a4fa59e7daa74a4]
-2.6.32-upstream-stable: pending (2.6.32.26-rc1)
-linux-2.6: pending (2.6.32-28) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]
+2.6.32-upstream-stable: released (2.6.32.26)
+linux-2.6: released (2.6.32-28) [bugfix/all/stable/2.6.32.26.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]
-2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/gdth-integer-overflow-in-ioctl.patch]
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/stable/2.6.32.26.patch]

Modified: active/CVE-2010-4164
===================================================================
--- active/CVE-2010-4164	2010-11-25 15:40:57 UTC (rev 2048)
+++ active/CVE-2010-4164	2010-11-25 16:55:04 UTC (rev 2049)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: pending [a6331d6]
 2.6.32-upstream-stable:
-linux-2.6: pending (2.6.32-28) [bugfix/all/x25-Prevent-crashing-when-parsing-bad-X.25-facilities.patch]
+linux-2.6: released (2.6.32-28) [bugfix/all/x25-Prevent-crashing-when-parsing-bad-X.25-facilities.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny1) [bugfix/all/x25-prevent-crashing-when-parsing-bad-facilities.patch]
-2.6.32-squeeze-security: pending (2.6.32-28) [bugfix/all/x25-Prevent-crashing-when-parsing-bad-X.25-facilities.patch]
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/x25-Prevent-crashing-when-parsing-bad-X.25-facilities.patch]

Modified: active/CVE-2010-4165
===================================================================
--- active/CVE-2010-4165	2010-11-25 15:40:57 UTC (rev 2048)
+++ active/CVE-2010-4165	2010-11-25 16:55:04 UTC (rev 2049)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.37-rc2) [7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2]
 2.6.32-upstream-stable: needed
-linux-2.6: pending (2.6.32-28)
+linux-2.6: released (2.6.32-28) [debian/patches/bugfix/all/tcp-Increase-TCP_MAXSEG-socket-option-minimum.patch]
 2.6.26-lenny-security: N/A
-2.6.32-squeeze-security: pending (2.6.32-28)
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/tcp-Increase-TCP_MAXSEG-socket-option-minimum.patch]




More information about the kernel-sec-discuss mailing list