[kernel-sec-discuss] r2481 - active
Dann Frazier
dannf at alioth.debian.org
Wed Sep 7 04:58:40 UTC 2011
Author: dannf
Date: 2011-09-07 04:58:39 +0000 (Wed, 07 Sep 2011)
New Revision: 2481
Modified:
active/CVE-2011-1020
active/CVE-2011-1576
active/CVE-2011-2484
active/CVE-2011-2491
active/CVE-2011-2492
active/CVE-2011-2495
active/CVE-2011-2496
active/CVE-2011-2497
active/CVE-2011-2517
active/CVE-2011-2525
active/CVE-2011-2699
active/CVE-2011-2700
active/CVE-2011-2723
active/CVE-2011-2905
active/CVE-2011-2909
active/CVE-2011-2918
active/CVE-2011-2928
active/CVE-2011-3188
active/CVE-2011-3191
Log:
2.6.32-35squeeze1 is released (though not yet DSA'd, still missing builds)
Modified: active/CVE-2011-1020
===================================================================
--- active/CVE-2011-1020 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-1020 2011-09-07 04:58:39 UTC (rev 2481)
@@ -16,4 +16,4 @@
2.6.32-upstream-stable: needed
sid: needed
2.6.26-lenny-security: pending (2.6.26-26lenny4) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch]
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch, bugfix/all/proc-syscall-stack-personality-races.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch, bugfix/all/proc-syscall-stack-personality-races.patch]
Modified: active/CVE-2011-1576
===================================================================
--- active/CVE-2011-1576 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-1576 2011-09-07 04:58:39 UTC (rev 2481)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable: needed
sid: N/A "This issue does not affect the upstream kernel as the code path in question is no longer reachable due to changes in the VLAN subsystem."
2.6.26-lenny-security: N/A "code not present"
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/net-fix-memory-leak+corruption-on-VLAN-GRO_DROP.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/net-fix-memory-leak+corruption-on-VLAN-GRO_DROP.patch]
Modified: active/CVE-2011-2484
===================================================================
--- active/CVE-2011-2484 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2484 2011-09-07 04:58:39 UTC (rev 2481)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable: released (2.6.32.43)
sid: released (2.6.39-3)
2.6.26-lenny-security: pending (2.6.26-26lenny4) [bugfix/all/taskstats-don-t-allow-duplicate-entries-in-listener-mode.patch]
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/taskstats-don-t-allow-duplicate-entries-in-listener-mode.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/taskstats-don-t-allow-duplicate-entries-in-listener-mode.patch]
Modified: active/CVE-2011-2491
===================================================================
--- active/CVE-2011-2491 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2491 2011-09-07 04:58:39 UTC (rev 2481)
@@ -6,4 +6,4 @@
2.6.32-upstream-stable:
sid: released (3.0.0-1)
2.6.26-lenny-security: pending (2.6.26-24lenny4) [bugfix/all/nlm-dont-hang-forever-on-nlm-unlock-requests.patch]
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/nlm-dont-hang-forever-on-nlm-unlock-requests.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/nlm-dont-hang-forever-on-nlm-unlock-requests.patch]
Modified: active/CVE-2011-2492
===================================================================
--- active/CVE-2011-2492 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2492 2011-09-07 04:58:39 UTC (rev 2481)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable: needed
sid: released (3.0.0-1)
2.6.26-lenny-security: pending (2.6.26-26lenny4) [bugfix/all/CVE-2011-2492.patch]
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/bluetooth-l2cap-and-rfcomm-fix-1-byte-infoleak-to-userspace.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/bluetooth-l2cap-and-rfcomm-fix-1-byte-infoleak-to-userspace.patch]
Modified: active/CVE-2011-2495
===================================================================
--- active/CVE-2011-2495 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2495 2011-09-07 04:58:39 UTC (rev 2481)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable: released (2.6.32.44)
sid: released (3.0.0-1)
2.6.26-lenny-security: pending (2.6.26-26lenny4) [bugfix/all/proc-restrict-access-to-proc-pid-io.patch]
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/proc-restrict-access-to-proc-pid-io.patch, bugfix/all/proc-fix-a-race-in-do_io_accounting.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/proc-restrict-access-to-proc-pid-io.patch, bugfix/all/proc-fix-a-race-in-do_io_accounting.patch]
Modified: active/CVE-2011-2496
===================================================================
--- active/CVE-2011-2496 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2496 2011-09-07 04:58:39 UTC (rev 2481)
@@ -10,4 +10,4 @@
2.6.32-upstream-stable: needed
sid: released (2.6.39-1)
2.6.26-lenny-security: pending (2.6.26-26lenny4) [bugfix/all/mm-avoid-wrapping-vm_pgoff-in-mremap.patch, bugfix/all/vm-fix-vm_pgoff-wrap-in-stack-expansion.patch, bugfix/all/vm-fix-vm_pgoff-wrap-in-upward-expansion.patch]
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/stable/2.6.32.37.patch, bugfix/all/vm-fix-vm_pgoff-wrap-in-stack-expansion.patch, bugfix/all/vm-fix-vm_pgoff-wrap-in-upward-expansion.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/stable/2.6.32.37.patch, bugfix/all/vm-fix-vm_pgoff-wrap-in-stack-expansion.patch, bugfix/all/vm-fix-vm_pgoff-wrap-in-upward-expansion.patch]
Modified: active/CVE-2011-2497
===================================================================
--- active/CVE-2011-2497 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2497 2011-09-07 04:58:39 UTC (rev 2481)
@@ -8,4 +8,4 @@
2.6.32-upstream-stable: needed
sid: released (2.6.39-3)
2.6.26-lenny-security: pending (2.6.26-26lenny4) [bugfix/all/bluetooth-prevent-buffer-overflow-in-l2cap-config-request.patch]
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/bluetooth-prevent-buffer-overflow-in-l2cap-config-request.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/bluetooth-prevent-buffer-overflow-in-l2cap-config-request.patch]
Modified: active/CVE-2011-2517
===================================================================
--- active/CVE-2011-2517 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2517 2011-09-07 04:58:39 UTC (rev 2481)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable: needed
sid: released (2.6.39-3)
2.6.26-lenny-security: N/A "Introduced in 2.6.29"
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/nl80211-fix-check-for-valid-SSID-size-in-scan-operations.patch, bugfix/all/nl80211-fix-overflow-in-ssid_len.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/nl80211-fix-check-for-valid-SSID-size-in-scan-operations.patch, bugfix/all/nl80211-fix-overflow-in-ssid_len.patch]
Modified: active/CVE-2011-2525
===================================================================
--- active/CVE-2011-2525 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2525 2011-09-07 04:58:39 UTC (rev 2481)
@@ -6,4 +6,4 @@
2.6.32-upstream-stable: needed
sid: released (2.6.35-1)
2.6.26-lenny-security: pending (2.6.26-26lenny4) [bugfix/all/net_sched-Fix-qdisc_notify.patch]
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/net_sched-Fix-qdisc_notify.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/net_sched-Fix-qdisc_notify.patch]
Modified: active/CVE-2011-2699
===================================================================
--- active/CVE-2011-2699 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2699 2011-09-07 04:58:39 UTC (rev 2481)
@@ -8,5 +8,5 @@
upstream: released (3.1-rc1) [87c48fa3b4630905f98268dde838ee43626a060c]
2.6.32-upstream-stable: needed
sid: released (3.0.0-2) [bugfix/all/stable/3.0.2.patch]
-2.6.26-lenny-security:
+2.6.26-lenny-security: ignored "too intrusive for an oldstable backport"
2.6.32-squeeze-security: needed
Modified: active/CVE-2011-2700
===================================================================
--- active/CVE-2011-2700 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2700 2011-09-07 04:58:39 UTC (rev 2481)
@@ -6,4 +6,4 @@
2.6.32-upstream-stable: released (2.6.32.44)
sid: released (3.0.0-1)
2.6.26-lenny-security: N/A "Driver introduced in 2.6.32"
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/si4713-i2c-avoid-potential-buffer-overflow-on-si4713.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/si4713-i2c-avoid-potential-buffer-overflow-on-si4713.patch]
Modified: active/CVE-2011-2723
===================================================================
--- active/CVE-2011-2723 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2723 2011-09-07 04:58:39 UTC (rev 2481)
@@ -6,4 +6,4 @@
2.6.32-upstream-stable: needed
sid: released (3.0.0-2) [bugfix/all/stable/3.0.1.patch]
2.6.26-lenny-security: N/A "Introduced in 2.6.31 with a5b1cf28"
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/gro-only-reset-frag0-when-skb-can-be-pulled.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/gro-only-reset-frag0-when-skb-can-be-pulled.patch]
Modified: active/CVE-2011-2905
===================================================================
--- active/CVE-2011-2905 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2905 2011-09-07 04:58:39 UTC (rev 2481)
@@ -6,4 +6,4 @@
2.6.32-upstream-stable: released (2.6.32.46)
sid: released (3.0.0-2)
2.6.26-lenny-security: N/A "perf does not yet exist"
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/perf-do-not-look-at-.-config-for-configuration.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/perf-do-not-look-at-.-config-for-configuration.patch]
Modified: active/CVE-2011-2909
===================================================================
--- active/CVE-2011-2909 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2909 2011-09-07 04:58:39 UTC (rev 2481)
@@ -6,4 +6,4 @@
2.6.32-upstream-stable: released (2.6.32.44)
sid: released (3.0.0-2) [bugfix/all/stable/3.0.1.patch]
2.6.26-lenny-security: N/A "Vulnerable code not present"
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/comedi-fix-infoleak-to-userspace.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/comedi-fix-infoleak-to-userspace.patch]
Modified: active/CVE-2011-2918
===================================================================
--- active/CVE-2011-2918 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2918 2011-09-07 04:58:39 UTC (rev 2481)
@@ -9,4 +9,4 @@
2.6.32-upstream-stable: released (2.6.32.44)
sid: released (3.0.0-2)
2.6.26-lenny-security: N/A "perf does not yet exist"
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/perf-remove-the-nmi-parameter-from-the-swevent-and-overflow-interface.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/perf-remove-the-nmi-parameter-from-the-swevent-and-overflow-interface.patch]
Modified: active/CVE-2011-2928
===================================================================
--- active/CVE-2011-2928 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-2928 2011-09-07 04:58:39 UTC (rev 2481)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable: released (2.6.32.46)
sid: released (3.0.0-2)
2.6.26-lenny-security: pending (2.6.26-26lenny4) [bugfix/all/befs-validate-length-of-long-symbolic-links.patch]
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/befs-validate-length-of-long-symbolic-links.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/befs-validate-length-of-long-symbolic-links.patch]
Modified: active/CVE-2011-3188
===================================================================
--- active/CVE-2011-3188 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-3188 2011-09-07 04:58:39 UTC (rev 2481)
@@ -6,4 +6,4 @@
2.6.32-upstream-stable: released (2.6.32.45)
sid: needed
2.6.26-lenny-security: needed
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/CVE-2011-3188.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/CVE-2011-3188.patch]
Modified: active/CVE-2011-3191
===================================================================
--- active/CVE-2011-3191 2011-09-07 04:58:33 UTC (rev 2480)
+++ active/CVE-2011-3191 2011-09-07 04:58:39 UTC (rev 2481)
@@ -8,4 +8,4 @@
2.6.32-upstream-stable: needed
sid: needed
2.6.26-lenny-security: pending (2.6.26-26lenny4) [bugfix/all/cifs-fix-possible-memory-corruption-in-CIFSFindNext.patch]
-2.6.32-squeeze-security: pending (2.6.32-35squeeze1) [bugfix/all/cifs-fix-possible-memory-corruption-in-CIFSFindNext.patch]
+2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/cifs-fix-possible-memory-corruption-in-CIFSFindNext.patch]
More information about the kernel-sec-discuss
mailing list