[kernel-sec-discuss] r2537 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Fri Nov 4 06:49:06 UTC 2011


Author: jmm
Date: 2011-11-04 06:49:04 +0000 (Fri, 04 Nov 2011)
New Revision: 2537

Modified:
   active/CVE-2010-4249
   active/CVE-2011-1161
   active/CVE-2011-1162
   active/CVE-2011-2491
   active/CVE-2011-2492
   active/CVE-2011-2496
   active/CVE-2011-2497
   active/CVE-2011-2517
   active/CVE-2011-2525
Log:
record fixes submitted and pending for 2.6.32.47


Modified: active/CVE-2010-4249
===================================================================
--- active/CVE-2010-4249	2011-11-02 07:47:59 UTC (rev 2536)
+++ active/CVE-2010-4249	2011-11-04 06:49:04 UTC (rev 2537)
@@ -27,10 +27,10 @@
  dannf> have a different CVE?
  dannf>
  dannf> I've added CVE-2010-af_unix-recursion to track that issue.
- jmm> 2.6.32.40 is missing bba14
+ jmm> 2.6.32.40 is missing bba14, it was added in 2.6.32.47
 Bugs:
 upstream: released (2.6.38) [25888e30319f8896fc656fc68643e6a078263060, 9915672d41273f5b77f1b3c29b391ffb7732b84b, bba14de98753cb6599a2dae0e520714b2153522d]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.47)
 sid: released (2.6.32-30) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch]
 2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch]
 2.6.32-squeeze-security: released (2.6.32-30) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch, bugfix/all/af_unix-limit-recursion-level.patch]

Modified: active/CVE-2011-1161
===================================================================
--- active/CVE-2011-1161	2011-11-02 07:47:59 UTC (rev 2536)
+++ active/CVE-2011-1161	2011-11-04 06:49:04 UTC (rev 2537)
@@ -5,7 +5,7 @@
 Notes:
 Bugs:
 upstream: released (3.1-rc8) [6b07d30aca7e52f2881b8c8c20c8a2cd28e8b3d3]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.47)
 sid: released (3.0.0-5) [bugfix/all/stable/3.0.5.patch]
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: needed 

Modified: active/CVE-2011-1162
===================================================================
--- active/CVE-2011-1162	2011-11-02 07:47:59 UTC (rev 2536)
+++ active/CVE-2011-1162	2011-11-04 06:49:04 UTC (rev 2537)
@@ -5,7 +5,7 @@
 Notes:
 Bugs:
 upstream: released (3.1-rc8) [3321c07ae5068568cd61ac9f4ba749006a7185c9]
-2.6.32-upstream-stable: needed 
+2.6.32-upstream-stable: pending (2.6.32.47)
 sid: released (3.0.0-5) [bugfix/all/stable/3.0.5.patch]
 2.6.26-lenny-security: needed 
 2.6.32-squeeze-security: needed 

Modified: active/CVE-2011-2491
===================================================================
--- active/CVE-2011-2491	2011-11-02 07:47:59 UTC (rev 2536)
+++ active/CVE-2011-2491	2011-11-04 06:49:04 UTC (rev 2537)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (3.0-rc5) [0b760113a3a155269a3fba93a409c640031dd68f]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.47)
 sid: released (3.0.0-1)
 2.6.26-lenny-security: released (2.6.26-24lenny4) [bugfix/all/nlm-dont-hang-forever-on-nlm-unlock-requests.patch]
 2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/nlm-dont-hang-forever-on-nlm-unlock-requests.patch]

Modified: active/CVE-2011-2492
===================================================================
--- active/CVE-2011-2492	2011-11-02 07:47:59 UTC (rev 2536)
+++ active/CVE-2011-2492	2011-11-04 06:49:04 UTC (rev 2537)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (3.0-rc4) [8d03e971cf403305217b8e62db3a2e5ad2d6263f]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.47)
 sid: released (3.0.0-1)
 2.6.26-lenny-security: released (2.6.26-26lenny4) [bugfix/all/CVE-2011-2492.patch]
 2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/bluetooth-l2cap-and-rfcomm-fix-1-byte-infoleak-to-userspace.patch]

Modified: active/CVE-2011-2496
===================================================================
--- active/CVE-2011-2496	2011-11-02 07:47:59 UTC (rev 2536)
+++ active/CVE-2011-2496	2011-11-04 06:49:04 UTC (rev 2537)
@@ -4,10 +4,10 @@
  http://www.spinics.net/lists/linux-mm/msg17093.html
  http://groups.google.com/group/fa.linux.kernel/msg/9e43ab898c5e6d16
 Notes:
- jmm> Only 9821 was merged in 2.6.32.37, the other two are missing
+ jmm> Only 9821 was merged in 2.6.32.37, the other two only added in 2.6.32.47
 Bugs:
 upstream: released (2.6.39) [982134ba62618c2d69fbbbd166d0a11ee3b7e3d8, a626ca6a656450e9f4df91d0dda238fff23285f4, 42c36f63ac1366ab0ecc2d5717821362c259f517]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.47)
 sid: released (2.6.39-1)
 2.6.26-lenny-security: released (2.6.26-26lenny4) [bugfix/all/mm-avoid-wrapping-vm_pgoff-in-mremap.patch, bugfix/all/vm-fix-vm_pgoff-wrap-in-stack-expansion.patch, bugfix/all/vm-fix-vm_pgoff-wrap-in-upward-expansion.patch]
 2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/stable/2.6.32.37.patch, bugfix/all/vm-fix-vm_pgoff-wrap-in-stack-expansion.patch, bugfix/all/vm-fix-vm_pgoff-wrap-in-upward-expansion.patch]

Modified: active/CVE-2011-2497
===================================================================
--- active/CVE-2011-2497	2011-11-02 07:47:59 UTC (rev 2536)
+++ active/CVE-2011-2497	2011-11-04 06:49:04 UTC (rev 2537)
@@ -5,7 +5,7 @@
  jmm> Introduced in 2.6.22
 Bugs:
 upstream: released (3.0) [7ac28817536797fd40e9646452183606f9e17f71]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.47)
 sid: released (2.6.39-3)
 2.6.26-lenny-security: released (2.6.26-26lenny4) [bugfix/all/bluetooth-prevent-buffer-overflow-in-l2cap-config-request.patch]
 2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/bluetooth-prevent-buffer-overflow-in-l2cap-config-request.patch]

Modified: active/CVE-2011-2517
===================================================================
--- active/CVE-2011-2517	2011-11-02 07:47:59 UTC (rev 2536)
+++ active/CVE-2011-2517	2011-11-04 06:49:04 UTC (rev 2537)
@@ -2,9 +2,10 @@
 References: 
 Notes:
  jmm> Requires CAP_NET_ADMIN
+ jmm> Status of 208c72f4fe needs to be checked in final .47
 Bugs:
 upstream: released (3.0-rc3) [208c72f4fe44fe09577e7975ba0e7fa0278f3d03 , 57a27e1d6a3bb9ad4efeebd3a8c71156d6207536]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.47)
 sid: released (2.6.39-3)
 2.6.26-lenny-security: N/A "Introduced in 2.6.29"
 2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/nl80211-fix-check-for-valid-SSID-size-in-scan-operations.patch, bugfix/all/nl80211-fix-overflow-in-ssid_len.patch]

Modified: active/CVE-2011-2525
===================================================================
--- active/CVE-2011-2525	2011-11-02 07:47:59 UTC (rev 2536)
+++ active/CVE-2011-2525	2011-11-04 06:49:04 UTC (rev 2537)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (2.6.35) [53b0f08042f04813cd1a7473dacd3edfacb28eb3]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.47)
 sid: released (2.6.35-1)
 2.6.26-lenny-security: released (2.6.26-26lenny4) [bugfix/all/net_sched-Fix-qdisc_notify.patch]
 2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/net_sched-Fix-qdisc_notify.patch]




More information about the kernel-sec-discuss mailing list