[kernel-sec-discuss] r2592 - active
Dann Frazier
dannf at alioth.debian.org
Mon Jan 9 21:22:02 UTC 2012
Author: dannf
Date: 2012-01-09 21:22:01 +0000 (Mon, 09 Jan 2012)
New Revision: 2592
Modified:
active/CVE-2011-2203
active/CVE-2011-4077
active/CVE-2011-4110
active/CVE-2011-4127
active/CVE-2011-4347
active/CVE-2011-4611
active/CVE-2011-4622
active/CVE-2011-4914
Log:
lenny/squeeze updates
Modified: active/CVE-2011-2203
===================================================================
--- active/CVE-2011-2203 2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-2203 2012-01-09 21:22:01 UTC (rev 2592)
@@ -8,5 +8,5 @@
upstream: released (3.2-rc1) [434a964daa14b9db083ce20404a4a2add54d037a]
2.6.32-upstream-stable: released (2.6.32.51)
sid: released (3.1.1-1)
-2.6.26-lenny-security:
+2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/hfs-fix-hfs_find_init-ext_tree-NULL-ptr-oops.patch]
2.6.32-squeeze-security: released (2.6.32-40)
Modified: active/CVE-2011-4077
===================================================================
--- active/CVE-2011-4077 2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4077 2012-01-09 21:22:01 UTC (rev 2592)
@@ -9,5 +9,5 @@
upstream: released (3.2-rc2) [b52a360b2aa1c59ba9970fb0f52bbb093fcc7a24]
2.6.32-upstream-stable: needed
sid: released (3.0.0-6) [bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink.patch, bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink-2.patch]
-2.6.26-lenny-security:
-2.6.32-squeeze-security: needed
+2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
+2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
Modified: active/CVE-2011-4110
===================================================================
--- active/CVE-2011-4110 2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4110 2012-01-09 21:22:01 UTC (rev 2592)
@@ -6,5 +6,5 @@
upstream: released (3.2-rc3) [9f35a33b8d06263a165efe3541d9aa0cdbd70b3b]
2.6.32-upstream-stable: needed
sid: released (3.1.4-1)
-2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]
+2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]
Modified: active/CVE-2011-4127
===================================================================
--- active/CVE-2011-4127 2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4127 2012-01-09 21:22:01 UTC (rev 2592)
@@ -8,4 +8,5 @@
2.6.32-upstream-stable: needed
sid: released (3.1.8-1)
2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/add-scsi_cmd_blk_ioctl-wrapper.patch, bugfix/all/limit-ioctls-forwarded-to-non-scsi-devices.patch, bugfix/all/treat-lvs-on-one-pv-like-a-partition.patch]
+
Modified: active/CVE-2011-4347
===================================================================
--- active/CVE-2011-4347 2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4347 2012-01-09 21:22:01 UTC (rev 2592)
@@ -3,6 +3,7 @@
https://bugzilla.redhat.com/show_bug.cgi?id=756084
http://thread.gmane.org/gmane.comp.emulators.kvm.devel/82043
Notes:
+ dannf> is this 3d27e23b17010c668db311140b17bbbb70c78fb9?
Bugs:
upstream: needed
2.6.32-upstream-stable:
Modified: active/CVE-2011-4611
===================================================================
--- active/CVE-2011-4611 2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4611 2012-01-09 21:22:01 UTC (rev 2592)
@@ -6,7 +6,7 @@
jmm> and d819437156fd99da61d4e1402b2dbfc5cc472265 from 3.0
Bugs:
upstream: released (3.0) [0837e3242c73566fc1c0196b4ec61779c25ffc93, ad5d5292f16c6c1d7d3e257c4c7407594286b97e, d819437156fd99da61d4e1402b2dbfc5cc472265]
-2.6.32-upstream-stable:
+2.6.32-upstream-stable: released (2.6.32.42) [3a579b0ce569d5738120d74bdcc8f76b740c97c4,24fb3f4cf3de9955eae325d421047c0f2dd6b48f]
sid: released (3.0.0-1)
2.6.26-lenny-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: released (2.6.32-36) [bugfix/all/stable/2.6.32.34.patch, bugfix/all/stable/2.6.32.34.patch]
Modified: active/CVE-2011-4622
===================================================================
--- active/CVE-2011-4622 2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4622 2012-01-09 21:22:01 UTC (rev 2592)
@@ -9,4 +9,4 @@
2.6.32-upstream-stable:
sid: released (3.1.8-1)
2.6.26-lenny-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]
Modified: active/CVE-2011-4914
===================================================================
--- active/CVE-2011-4914 2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4914 2012-01-09 21:22:01 UTC (rev 2592)
@@ -9,4 +9,4 @@
2.6.32-upstream-stable: needed
sid: released (2.6.39-1)
2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]
More information about the kernel-sec-discuss
mailing list