[kernel-sec-discuss] r2600 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Jan 16 07:20:58 UTC 2012


Author: jmm
Date: 2012-01-16 07:20:57 +0000 (Mon, 16 Jan 2012)
New Revision: 2600

Modified:
   active/CVE-2011-4077
   active/CVE-2011-4110
   active/CVE-2011-4127
   active/CVE-2011-4622
   active/CVE-2011-4914
Log:
fixes from DSA 2389


Modified: active/CVE-2011-4077
===================================================================
--- active/CVE-2011-4077	2012-01-16 07:20:30 UTC (rev 2599)
+++ active/CVE-2011-4077	2012-01-16 07:20:57 UTC (rev 2600)
@@ -10,4 +10,4 @@
 2.6.32-upstream-stable: needed
 sid: released (3.0.0-6) [bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink.patch, bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink-2.patch]
 2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
-2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
+2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]

Modified: active/CVE-2011-4110
===================================================================
--- active/CVE-2011-4110	2012-01-16 07:20:30 UTC (rev 2599)
+++ active/CVE-2011-4110	2012-01-16 07:20:57 UTC (rev 2600)
@@ -7,4 +7,4 @@
 2.6.32-upstream-stable: needed
 sid: released (3.1.4-1)
 2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]
-2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]
+2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]

Modified: active/CVE-2011-4127
===================================================================
--- active/CVE-2011-4127	2012-01-16 07:20:30 UTC (rev 2599)
+++ active/CVE-2011-4127	2012-01-16 07:20:57 UTC (rev 2600)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.1.8-1)
 2.6.26-lenny-security: needed
-2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/add-scsi_cmd_blk_ioctl-wrapper.patch, bugfix/all/limit-ioctls-forwarded-to-non-scsi-devices.patch, bugfix/all/treat-lvs-on-one-pv-like-a-partition.patch]
+2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/add-scsi_cmd_blk_ioctl-wrapper.patch, bugfix/all/limit-ioctls-forwarded-to-non-scsi-devices.patch, bugfix/all/treat-lvs-on-one-pv-like-a-partition.patch]
 

Modified: active/CVE-2011-4622
===================================================================
--- active/CVE-2011-4622	2012-01-16 07:20:30 UTC (rev 2599)
+++ active/CVE-2011-4622	2012-01-16 07:20:57 UTC (rev 2600)
@@ -9,4 +9,4 @@
 2.6.32-upstream-stable:
 sid: released (3.1.8-1)
 2.6.26-lenny-security:
-2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]
+2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]

Modified: active/CVE-2011-4914
===================================================================
--- active/CVE-2011-4914	2012-01-16 07:20:30 UTC (rev 2599)
+++ active/CVE-2011-4914	2012-01-16 07:20:57 UTC (rev 2600)
@@ -9,4 +9,4 @@
 2.6.32-upstream-stable: needed
 sid: released (2.6.39-1)
 2.6.26-lenny-security: needed
-2.6.32-squeeze-security: pending (2.6.32-39squeeze1) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]
+2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]




More information about the kernel-sec-discuss mailing list