[kernel-sec-discuss] r2592 - active

Dann Frazier dannf at alioth.debian.org
Mon Jan 9 21:22:02 UTC 2012


Author: dannf
Date: 2012-01-09 21:22:01 +0000 (Mon, 09 Jan 2012)
New Revision: 2592

Modified:
   active/CVE-2011-2203
   active/CVE-2011-4077
   active/CVE-2011-4110
   active/CVE-2011-4127
   active/CVE-2011-4347
   active/CVE-2011-4611
   active/CVE-2011-4622
   active/CVE-2011-4914
Log:
lenny/squeeze updates

Modified: active/CVE-2011-2203
===================================================================
--- active/CVE-2011-2203	2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-2203	2012-01-09 21:22:01 UTC (rev 2592)
@@ -8,5 +8,5 @@
 upstream: released (3.2-rc1) [434a964daa14b9db083ce20404a4a2add54d037a]
 2.6.32-upstream-stable: released (2.6.32.51)
 sid: released (3.1.1-1)
-2.6.26-lenny-security:
+2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/hfs-fix-hfs_find_init-ext_tree-NULL-ptr-oops.patch]
 2.6.32-squeeze-security: released (2.6.32-40)

Modified: active/CVE-2011-4077
===================================================================
--- active/CVE-2011-4077	2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4077	2012-01-09 21:22:01 UTC (rev 2592)
@@ -9,5 +9,5 @@
 upstream: released (3.2-rc2) [b52a360b2aa1c59ba9970fb0f52bbb093fcc7a24]
 2.6.32-upstream-stable: needed
 sid: released (3.0.0-6) [bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink.patch, bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink-2.patch]
-2.6.26-lenny-security: 
-2.6.32-squeeze-security: needed
+2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
+2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]

Modified: active/CVE-2011-4110
===================================================================
--- active/CVE-2011-4110	2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4110	2012-01-09 21:22:01 UTC (rev 2592)
@@ -6,5 +6,5 @@
 upstream: released (3.2-rc3) [9f35a33b8d06263a165efe3541d9aa0cdbd70b3b]
 2.6.32-upstream-stable: needed
 sid: released (3.1.4-1)
-2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]
+2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]

Modified: active/CVE-2011-4127
===================================================================
--- active/CVE-2011-4127	2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4127	2012-01-09 21:22:01 UTC (rev 2592)
@@ -8,4 +8,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.1.8-1)
 2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/add-scsi_cmd_blk_ioctl-wrapper.patch, bugfix/all/limit-ioctls-forwarded-to-non-scsi-devices.patch, bugfix/all/treat-lvs-on-one-pv-like-a-partition.patch]
+

Modified: active/CVE-2011-4347
===================================================================
--- active/CVE-2011-4347	2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4347	2012-01-09 21:22:01 UTC (rev 2592)
@@ -3,6 +3,7 @@
  https://bugzilla.redhat.com/show_bug.cgi?id=756084
  http://thread.gmane.org/gmane.comp.emulators.kvm.devel/82043
 Notes:
+ dannf> is this 3d27e23b17010c668db311140b17bbbb70c78fb9?
 Bugs:
 upstream: needed
 2.6.32-upstream-stable:

Modified: active/CVE-2011-4611
===================================================================
--- active/CVE-2011-4611	2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4611	2012-01-09 21:22:01 UTC (rev 2592)
@@ -6,7 +6,7 @@
  jmm> and d819437156fd99da61d4e1402b2dbfc5cc472265 from 3.0
 Bugs:
 upstream: released (3.0) [0837e3242c73566fc1c0196b4ec61779c25ffc93, ad5d5292f16c6c1d7d3e257c4c7407594286b97e, d819437156fd99da61d4e1402b2dbfc5cc472265]
-2.6.32-upstream-stable: 
+2.6.32-upstream-stable: released (2.6.32.42) [3a579b0ce569d5738120d74bdcc8f76b740c97c4,24fb3f4cf3de9955eae325d421047c0f2dd6b48f]
 sid: released (3.0.0-1)
 2.6.26-lenny-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: released (2.6.32-36) [bugfix/all/stable/2.6.32.34.patch, bugfix/all/stable/2.6.32.34.patch]

Modified: active/CVE-2011-4622
===================================================================
--- active/CVE-2011-4622	2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4622	2012-01-09 21:22:01 UTC (rev 2592)
@@ -9,4 +9,4 @@
 2.6.32-upstream-stable:
 sid: released (3.1.8-1)
 2.6.26-lenny-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]

Modified: active/CVE-2011-4914
===================================================================
--- active/CVE-2011-4914	2012-01-09 04:52:08 UTC (rev 2591)
+++ active/CVE-2011-4914	2012-01-09 21:22:01 UTC (rev 2592)
@@ -9,4 +9,4 @@
 2.6.32-upstream-stable: needed
 sid: released (2.6.39-1)
 2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]




More information about the kernel-sec-discuss mailing list