[kernel-sec-discuss] r2371 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Jun 20 08:59:14 UTC 2011


Author: jmm
Date: 2011-06-20 08:59:14 +0000 (Mon, 20 Jun 2011)
New Revision: 2371

Modified:
   active/CVE-2011-1477
   active/CVE-2011-1493
   active/CVE-2011-1577
   active/CVE-2011-1593
Log:
fixes from DSA 2264


Modified: active/CVE-2011-1477
===================================================================
--- active/CVE-2011-1477	2011-06-20 08:58:10 UTC (rev 2370)
+++ active/CVE-2011-1477	2011-06-20 08:59:14 UTC (rev 2371)
@@ -8,5 +8,5 @@
 upstream: released (2.6.39-rc1) [b769f49463711205d57286e64cf535ed4daf59e9]
 2.6.32-upstream-stable: released (2.6.32.37) [ef79e147a62e11f6a657b076bc98192fba725645]
 sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/sound-oss-remove-offset-from-load_patch-callbacks.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny3) [bugfix/all/sound-oss-remove-offset-from-load_patch-callbacks.patch]
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/stable/2.6.32.37.patch]

Modified: active/CVE-2011-1493
===================================================================
--- active/CVE-2011-1493	2011-06-20 08:58:10 UTC (rev 2370)
+++ active/CVE-2011-1493	2011-06-20 08:59:14 UTC (rev 2371)
@@ -6,5 +6,5 @@
 upstream: released (2.6.39-rc1) [be20250c13f88375345ad99950190685eda51eb8]
 2.6.32-upstream-stable: released (2.6.32.37) [62fdb8668c631619251cff6d964556e0f67b8dcd]
 sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/rose-prevent-heap-corruption-with-bad-facilities.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny3) [bugfix/all/rose-prevent-heap-corruption-with-bad-facilities.patch]
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/stable/2.6.32.37.patch]

Modified: active/CVE-2011-1577
===================================================================
--- active/CVE-2011-1577	2011-06-20 08:58:10 UTC (rev 2370)
+++ active/CVE-2011-1577	2011-06-20 08:59:14 UTC (rev 2371)
@@ -8,5 +8,5 @@
 upstream: released (3.0-rc1) [3eb8e74ec72736b9b9d728bad30484ec89c91dde]
 2.6.32-upstream-stable: needed
 sid: needed
-2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/efi-corrupted-GUID-partition-tables-can-cause-kernel-oops.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny3) [bugfix/all/efi-corrupted-GUID-partition-tables-can-cause-kernel-oops.patch]
 2.6.32-squeeze-security: pending (2.6.32-35) [bugfix/all/efi-corrupted-GUID-partition-tables-can-cause-kernel-oops.patch]

Modified: active/CVE-2011-1593
===================================================================
--- active/CVE-2011-1593	2011-06-20 08:58:10 UTC (rev 2370)
+++ active/CVE-2011-1593	2011-06-20 08:59:14 UTC (rev 2371)
@@ -8,5 +8,5 @@
 upstream: released (2.6.39-rc4) [c78193e9, d8bdc59f]
 2.6.32-upstream-stable: released (2.6.32.39) [67e022f3add1879292986e779b2aaf6ecb93fa58]
 sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.4.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/next_pidmap-fix-overflow-condition.patch, bugfix/all/proc-do-proper-range-check-on-readdir-offset.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny3) [bugfix/all/next_pidmap-fix-overflow-condition.patch, bugfix/all/proc-do-proper-range-check-on-readdir-offset.patch]
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/stable/2.6.32.39.patch]




More information about the kernel-sec-discuss mailing list