[kernel-sec-discuss] r2695 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Fri Jun 1 08:05:06 UTC 2012


Author: jmm
Date: 2012-06-01 08:05:04 +0000 (Fri, 01 Jun 2012)
New Revision: 2695

Modified:
   active/00boilerplate
   active/CVE-2010-4563
   active/CVE-2010-4805
   active/CVE-2011-1020
   active/CVE-2011-1083
   active/CVE-2011-1747
   active/CVE-2011-2695
   active/CVE-2011-2699
   active/CVE-2011-3347
   active/CVE-2011-4077
   active/CVE-2011-4086
   active/CVE-2011-4110
   active/CVE-2011-4131
   active/CVE-2011-4347
   active/CVE-2011-4621
   active/CVE-2011-4622
   active/CVE-2011-4914
   active/CVE-2011-4915
   active/CVE-2011-4917
   active/CVE-2012-0044
   active/CVE-2012-0045
   active/CVE-2012-0879
   active/CVE-2012-1090
   active/CVE-2012-1179
   active/CVE-2012-1601
   active/CVE-2012-2119
   active/CVE-2012-2121
   active/CVE-2012-2123
   active/CVE-2012-2133
   active/CVE-2012-2136
   active/CVE-2012-2313
   active/CVE-2012-2319
   active/CVE-2012-2373
   active/CVE-2012-2375
   active/CVE-2012-2383
   active/CVE-2012-2384
   active/CVE-2012-2390
Log:
new stanza for 3.2 LTS series


Modified: active/00boilerplate
===================================================================
--- active/00boilerplate	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/00boilerplate	2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,4 @@
 2.6.32-upstream-stable:
 sid:
 2.6.32-squeeze-security:
+3.2-upstream-stable:
\ No newline at end of file

Modified: active/CVE-2010-4563
===================================================================
--- active/CVE-2010-4563	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2010-4563	2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,4 @@
 2.6.32-upstream-stable:
 sid:
 2.6.32-squeeze-security:
+3.2-upstream-stable:

Modified: active/CVE-2010-4805
===================================================================
--- active/CVE-2010-4805	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2010-4805	2012-06-01 08:05:04 UTC (rev 2695)
@@ -9,3 +9,5 @@
 2.6.32-upstream-stable: needed
 sid: released (2.6.35-1)
 2.6.32-squeeze-security: needed "<dannf> We appear to already have all but the last since 2.6.32-22; I've a tentative backport for the last one"
+3.2-upstream-stable: N/A
+

Modified: active/CVE-2011-1020
===================================================================
--- active/CVE-2011-1020	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-1020	2012-06-01 08:05:04 UTC (rev 2695)
@@ -10,3 +10,5 @@
 sid: released (2.6.39-1)
 2.6.26-lenny-security: released (2.6.26-26lenny4) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch]
 2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch, bugfix/all/proc-syscall-stack-personality-races.patch]
+3.2-upstream-stable: N/A
+

Modified: active/CVE-2011-1083
===================================================================
--- active/CVE-2011-1083	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-1083	2012-06-01 08:05:04 UTC (rev 2695)
@@ -9,3 +9,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.9-1)
 2.6.32-squeeze-security: needed
+3.2-upstream-stable:
+

Modified: active/CVE-2011-1747
===================================================================
--- active/CVE-2011-1747	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-1747	2012-06-01 08:05:04 UTC (rev 2695)
@@ -16,3 +16,5 @@
 sid: needed "no upstream fix as of 2011.06.20"
 2.6.26-lenny-security: needed "no upstream fix as of 2011.06.20"
 2.6.32-squeeze-security: needed "no upstream fix as of 2011.06.20"
+3.2-upstream-stable: needed "no upstream fix as of 2011.06.20"
+

Modified: active/CVE-2011-2695
===================================================================
--- active/CVE-2011-2695	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-2695	2012-06-01 08:05:04 UTC (rev 2695)
@@ -10,3 +10,4 @@
 sid: released (3.0.0-1)
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: needed
+3.2-upstream-stable: N/A

Modified: active/CVE-2011-2699
===================================================================
--- active/CVE-2011-2699	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-2699	2012-06-01 08:05:04 UTC (rev 2695)
@@ -12,3 +12,4 @@
 sid: released (3.0.0-2) [bugfix/all/stable/3.0.2.patch]
 2.6.26-lenny-security: ignored "end of life"
 2.6.32-squeeze-security: released (2.6.32-41)
+3.2-upstream-stable: N/A

Modified: active/CVE-2011-3347
===================================================================
--- active/CVE-2011-3347	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-3347	2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
 2.6.32-upstream-stable:
 sid: released (3.2-1)
 2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
+3.2-upstream-stable: N/A

Modified: active/CVE-2011-4077
===================================================================
--- active/CVE-2011-4077	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4077	2012-06-01 08:05:04 UTC (rev 2695)
@@ -11,3 +11,4 @@
 sid: released (3.0.0-6) [bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink.patch, bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink-2.patch]
 2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
 2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
+3.2-upstream-stable: N/A

Modified: active/CVE-2011-4086
===================================================================
--- active/CVE-2011-4086	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4086	2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,4 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2-1)
 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_buffer.patch]
+3.2-upstream-stable: N/A

Modified: active/CVE-2011-4110
===================================================================
--- active/CVE-2011-4110	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4110	2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
 sid: released (3.1.4-1)
 2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]
 2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]
+3.2-upstream-stable: N/A

Modified: active/CVE-2011-4131
===================================================================
--- active/CVE-2011-4131	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4131	2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,4 @@
 2.6.32-upstream-stable: needed "partial fix in 2.6.32.44"
 sid: released (3.2.9-1)
 2.6.32-squeeze-security: needed "partial fix in 2.6.32-36"
+3.2-upstream-stable:

Modified: active/CVE-2011-4347
===================================================================
--- active/CVE-2011-4347	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4347	2012-06-01 08:05:04 UTC (rev 2695)
@@ -13,3 +13,4 @@
 sid: released (3.2.1-1)
 2.6.26-lenny-security: N/A "code not present"
 2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/KVM-Remove-ability-to-assign-a-device-without-iommu-support.patch, bugfix/all/KVM-Device-assignment-permission-checks.patch
+3.2-upstream-stable: N/A

Modified: active/CVE-2011-4621
===================================================================
--- active/CVE-2011-4621	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4621	2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
 2.6.32-upstream-stable: needed
 sid: released (2.6.37-1)
 2.6.32-squeeze-security: needed
+3.2-upstream-stable: N/A

Modified: active/CVE-2011-4622
===================================================================
--- active/CVE-2011-4622	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4622	2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
 sid: released (3.1.8-1)
 2.6.26-lenny-security: released (2.6.26-28) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]
 2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]
+3.2-upstream-stable: N/A

Modified: active/CVE-2011-4914
===================================================================
--- active/CVE-2011-4914	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4914	2012-06-01 08:05:04 UTC (rev 2695)
@@ -10,3 +10,4 @@
 sid: released (2.6.39-1)
 2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]
 2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]
+3.2-upstream-stable: N/A

Modified: active/CVE-2011-4915
===================================================================
--- active/CVE-2011-4915	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4915	2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,4 +7,5 @@
 upstream:
 2.6.32-upstream-stable:
 sid:
-2.6.32-squeeze-security: ignored (2.6.32-44) "patch not accepted upstream"
\ No newline at end of file
+2.6.32-squeeze-security: ignored (2.6.32-44) "patch not accepted upstream"
+3.2-upstream-stable:

Modified: active/CVE-2011-4917
===================================================================
--- active/CVE-2011-4917	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4917	2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
 2.6.32-upstream-stable:
 sid:
 2.6.32-squeeze-security: ignored (2.6.32-44) "patch not accepted upstream"
+3.2-upstream-stable:

Modified: active/CVE-2012-0044
===================================================================
--- active/CVE-2012-0044	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-0044	2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,4 @@
 sid: released (3.1.5-1)
 2.6.26-lenny-security: N/A "vulnerable code not present"
 2.6.32-squeeze-security: released (2.6.32-41)
+3.2-upstream-stable: N/A

Modified: active/CVE-2012-0045
===================================================================
--- active/CVE-2012-0045	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-0045	2012-06-01 08:05:04 UTC (rev 2695)
@@ -10,3 +10,4 @@
 sid: released (3.2.2-1) [bugfix/x86/KVM-x86-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-x86-fix-missing-checks-in-syscall-emulation.patch]
 2.6.26-lenny-security: N/A "Introduced in 2.6.32"
 2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/x86/KVM-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-fix-missing-checks-in-syscall-emulation.patch]
+3.2-upstream-stable:

Modified: active/CVE-2012-0879
===================================================================
--- active/CVE-2012-0879	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-0879	2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,4 +8,5 @@
 2.6.32-upstream-stable: needed
 sid: released (2.6.33-1)
 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch]
+3.2-upstream-stable: N/A
 

Modified: active/CVE-2012-1090
===================================================================
--- active/CVE-2012-1090	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-1090	2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.10-1)
 2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/cifs-fix-dentry-refcount-leak-when-opening-a-FIFO-on.patch]
+3.2-upstream-stable:
\ No newline at end of file

Modified: active/CVE-2012-1179
===================================================================
--- active/CVE-2012-1179	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-1179	2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,4 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.14-1)
 2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
+3.2-upstream-stable:

Modified: active/CVE-2012-1601
===================================================================
--- active/CVE-2012-1601	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-1601	2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,5 @@
 2.6.32-upstream-stable:
 sid: pending (3.2.17-1) [bugfix/all/kvm-ensure-all-vcpus-are-consistent-with-in-kernel-irqchip.patch]
 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch]
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2119
===================================================================
--- active/CVE-2012-2119	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2119	2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,5 @@
 2.6.32-upstream-stable:
 sid:
 2.6.32-squeeze-security: ignored (2.6.32-44) "not upstream yet"
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2121
===================================================================
--- active/CVE-2012-2121	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2121	2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,5 @@
 2.6.32-upstream-stable:
 sid: pending (3.2.17-1) [bugfix/all/kvm-lock-slots_lock-around-device-assignment.patch]
 2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2123
===================================================================
--- active/CVE-2012-2123	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2123	2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,5 @@
 2.6.32-upstream-stable:
 sid: released (3.2.16-1)
 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch]
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2133
===================================================================
--- active/CVE-2012-2133	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2133	2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: needed
 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2136
===================================================================
--- active/CVE-2012-2136	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2136	2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,5 @@
 2.6.32-upstream-stable:
 sid:
 2.6.32-squeeze-security:
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2313
===================================================================
--- active/CVE-2012-2313	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2313	2012-06-01 08:05:04 UTC (rev 2695)
@@ -10,3 +10,5 @@
 2.6.32-upstream-stable: needed
 sid: pending (3.2.19-1)
 2.6.32-squeeze-security: needed
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2319
===================================================================
--- active/CVE-2012-2319	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2319	2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: pending (3.2.17-1)
 2.6.32-squeeze-security: needed
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2373
===================================================================
--- active/CVE-2012-2373	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2373	2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,5 @@
 2.6.32-upstream-stable:
 sid:
 2.6.32-squeeze-security:
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2375
===================================================================
--- active/CVE-2012-2375	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2375	2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,5 @@
 2.6.32-upstream-stable:
 sid: pending (3.2.19-1)
 2.6.32-squeeze-security:
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2383
===================================================================
--- active/CVE-2012-2383	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2383	2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,5 @@
 2.6.32-upstream-stable: N/A "Introduced in 2.6.39 with 8408c282"
 sid: released (3.2.17-1)
 2.6.32-squeeze-security: N/A "Introduced in 2.6.39 with 8408c282"
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2384
===================================================================
--- active/CVE-2012-2384	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2384	2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,5 @@
 2.6.32-upstream-stable: N/A "Introduced in 2.6.38 with 432e58ed"
 sid: released (3.2.17-1)
 2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 432e58ed"
+3.2-upstream-stable:
+

Modified: active/CVE-2012-2390
===================================================================
--- active/CVE-2012-2390	2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2390	2012-06-01 08:05:04 UTC (rev 2695)
@@ -9,3 +9,4 @@
 2.6.32-upstream-stable:
 sid:
 2.6.32-squeeze-security:
+3.2-upstream-stable:




More information about the kernel-sec-discuss mailing list