[kernel-sec-discuss] r2361 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Jun 20 08:52:13 UTC 2011


Author: jmm
Date: 2011-06-20 08:52:13 +0000 (Mon, 20 Jun 2011)
New Revision: 2361

Modified:
   active/CVE-2011-0695
   active/CVE-2011-0710
   active/CVE-2011-0711
   active/CVE-2011-0726
Log:
fixes from DSA 2264


Modified: active/CVE-2011-0695
===================================================================
--- active/CVE-2011-0695	2011-06-20 08:49:48 UTC (rev 2360)
+++ active/CVE-2011-0695	2011-06-20 08:52:13 UTC (rev 2361)
@@ -7,5 +7,5 @@
 upstream: released (2.6.39-rc1) [25ae21a, 2996343]
 2.6.32-upstream-stable: released (2.6.32.34) [df6f458, b8f71b5]
 sid: released (2.6.38-2) [bugfix/all/stable/2.6.38.2.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/rdma-cma-fix-crash-in-request-handlers.patch, bugfix/all/ib-cm-bump-reference-count-on-cm_id-before-invoking-callback.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny3) [bugfix/all/rdma-cma-fix-crash-in-request-handlers.patch, bugfix/all/ib-cm-bump-reference-count-on-cm_id-before-invoking-callback.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/stable/2.6.32.34.patch]

Modified: active/CVE-2011-0710
===================================================================
--- active/CVE-2011-0710	2011-06-20 08:49:48 UTC (rev 2360)
+++ active/CVE-2011-0710	2011-06-20 08:52:13 UTC (rev 2361)
@@ -6,5 +6,5 @@
 upstream: released (2.6.38-rc5) [261cd298a8c363d7985e3482946edb4bfedacf98]
 2.6.32-upstream-stable: released (2.6.32.30)
 sid: released (2.6.37-2)
-2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/s390/remove-task_show_regs.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny3) [bugfix/s390/remove-task_show_regs.patch]
 2.6.32-squeeze-security: released (2.6.32-31) [bugfix/s390/remove-task_show_regs.patch]

Modified: active/CVE-2011-0711
===================================================================
--- active/CVE-2011-0711	2011-06-20 08:49:48 UTC (rev 2360)
+++ active/CVE-2011-0711	2011-06-20 08:52:13 UTC (rev 2361)
@@ -7,5 +7,5 @@
 upstream: released (2.6.38-rc7) [c4d0c3b097f7584772316ee4d64a09fe0e4ddfca]
 2.6.32-upstream-stable: released (2.6.32.37)
 sid: released (2.6.38-1)
-2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/xfs-prevent-leaking-uninitialized-stack-memory-in-FSGEOMETRY_V1.patch, bugfix/all/xfs-zero-proper-structure-size-for-geometry-calls.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny3) [bugfix/all/xfs-prevent-leaking-uninitialized-stack-memory-in-FSGEOMETRY_V1.patch, bugfix/all/xfs-zero-proper-structure-size-for-geometry-calls.patch]
 2.6.32-squeeze-security: released (2.6.32-33) [bugfix/all/xfs-prevent-leaking-uninitialized-stack-memory-in-FSGEOMETRY_V1.patch, bugfix/all/xfs-zero-proper-structure-size-for-geometry-calls.patch]

Modified: active/CVE-2011-0726
===================================================================
--- active/CVE-2011-0726	2011-06-20 08:49:48 UTC (rev 2360)
+++ active/CVE-2011-0726	2011-06-20 08:52:13 UTC (rev 2361)
@@ -6,5 +6,5 @@
 upstream: released (2.6.39-rc1) [5883f57ca0008ffc93e09cbb9847a1928e50c6f3]
 2.6.32-upstream-stable: released (2.6.32.36)
 sid: released (2.6.38-2) [bugfix/all/stable/2.6.38.2.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/proc-avoid-information-leaks-to-non-privileged-processes.patch, bugfix/all/proc-protect-mm-start_code-end_code-in-proc-pid-stat.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny3) [bugfix/all/proc-avoid-information-leaks-to-non-privileged-processes.patch, bugfix/all/proc-protect-mm-start_code-end_code-in-proc-pid-stat.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/stable/2.6.32.36.patch]




More information about the kernel-sec-discuss mailing list