[kernel-sec-discuss] r2545 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Thu Nov 17 16:29:26 UTC 2011


Author: jmm
Date: 2011-11-17 16:29:25 +0000 (Thu, 17 Nov 2011)
New Revision: 2545

Modified:
   active/CVE-2010-4251
   active/CVE-2011-2189
   active/CVE-2011-2203
Log:
updates


Modified: active/CVE-2010-4251
===================================================================
--- active/CVE-2010-4251	2011-11-14 06:38:55 UTC (rev 2544)
+++ active/CVE-2010-4251	2011-11-17 16:29:25 UTC (rev 2545)
@@ -14,7 +14,7 @@
  dannf> yeah, but a3a858f is just a function rename; no need to backport imo
 Bugs: 592187
 upstream: released (2.6.34)
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: ignored "Nacked by davem for 2.6.32 inclusion"
 sid: released (2.6.34-1)
-2.6.26-lenny-security: needed
+2.6.26-lenny-security: ignored "Too intrusive to backport for too little gain"
 2.6.32-squeeze-security: released (2.6.32-22) [bugfix/all/net-add-limit-for-socket-backlog.patch, bugfix/all/tcp-use-limited-socket-backlog.patch, bugfix/all/udp-use-limited-socket-backlog.patch, bugfix/all/llc-use-limited-socket-backlog.patch, bugfix/all/sctp-use-limited-socket-backlog.patch, bugfix/all/tipc-use-limited-socket-backlog.patch, bugfix/all/x25-use-limited-socket-backlog.patch]

Modified: active/CVE-2011-2189
===================================================================
--- active/CVE-2011-2189	2011-11-14 06:38:55 UTC (rev 2544)
+++ active/CVE-2011-2189	2011-11-17 16:29:25 UTC (rev 2545)
@@ -3,6 +3,7 @@
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=629373
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/720095
 Notes:
+ jmm> Only exploitable with CAP_NET_ADMIN
 Bugs:
 upstream:
 2.6.32-upstream-stable:

Modified: active/CVE-2011-2203
===================================================================
--- active/CVE-2011-2203	2011-11-14 06:38:55 UTC (rev 2544)
+++ active/CVE-2011-2203	2011-11-17 16:29:25 UTC (rev 2545)
@@ -8,6 +8,6 @@
 Bugs:
 upstream: released (3.2-rc1) [434a964daa14b9db083ce20404a4a2add54d037a]
 2.6.32-upstream-stable: needed
-sid: needed
+sid: released (3.1.1-1)
 2.6.26-lenny-security:
 2.6.32-squeeze-security:




More information about the kernel-sec-discuss mailing list