[kernel-sec-discuss] r2695 - active
Moritz Muehlenhoff
jmm at alioth.debian.org
Fri Jun 1 08:05:06 UTC 2012
Author: jmm
Date: 2012-06-01 08:05:04 +0000 (Fri, 01 Jun 2012)
New Revision: 2695
Modified:
active/00boilerplate
active/CVE-2010-4563
active/CVE-2010-4805
active/CVE-2011-1020
active/CVE-2011-1083
active/CVE-2011-1747
active/CVE-2011-2695
active/CVE-2011-2699
active/CVE-2011-3347
active/CVE-2011-4077
active/CVE-2011-4086
active/CVE-2011-4110
active/CVE-2011-4131
active/CVE-2011-4347
active/CVE-2011-4621
active/CVE-2011-4622
active/CVE-2011-4914
active/CVE-2011-4915
active/CVE-2011-4917
active/CVE-2012-0044
active/CVE-2012-0045
active/CVE-2012-0879
active/CVE-2012-1090
active/CVE-2012-1179
active/CVE-2012-1601
active/CVE-2012-2119
active/CVE-2012-2121
active/CVE-2012-2123
active/CVE-2012-2133
active/CVE-2012-2136
active/CVE-2012-2313
active/CVE-2012-2319
active/CVE-2012-2373
active/CVE-2012-2375
active/CVE-2012-2383
active/CVE-2012-2384
active/CVE-2012-2390
Log:
new stanza for 3.2 LTS series
Modified: active/00boilerplate
===================================================================
--- active/00boilerplate 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/00boilerplate 2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,4 @@
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security:
+3.2-upstream-stable:
\ No newline at end of file
Modified: active/CVE-2010-4563
===================================================================
--- active/CVE-2010-4563 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2010-4563 2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,4 @@
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security:
+3.2-upstream-stable:
Modified: active/CVE-2010-4805
===================================================================
--- active/CVE-2010-4805 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2010-4805 2012-06-01 08:05:04 UTC (rev 2695)
@@ -9,3 +9,5 @@
2.6.32-upstream-stable: needed
sid: released (2.6.35-1)
2.6.32-squeeze-security: needed "<dannf> We appear to already have all but the last since 2.6.32-22; I've a tentative backport for the last one"
+3.2-upstream-stable: N/A
+
Modified: active/CVE-2011-1020
===================================================================
--- active/CVE-2011-1020 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-1020 2012-06-01 08:05:04 UTC (rev 2695)
@@ -10,3 +10,5 @@
sid: released (2.6.39-1)
2.6.26-lenny-security: released (2.6.26-26lenny4) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch]
2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch, bugfix/all/proc-syscall-stack-personality-races.patch]
+3.2-upstream-stable: N/A
+
Modified: active/CVE-2011-1083
===================================================================
--- active/CVE-2011-1083 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-1083 2012-06-01 08:05:04 UTC (rev 2695)
@@ -9,3 +9,5 @@
2.6.32-upstream-stable: needed
sid: released (3.2.9-1)
2.6.32-squeeze-security: needed
+3.2-upstream-stable:
+
Modified: active/CVE-2011-1747
===================================================================
--- active/CVE-2011-1747 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-1747 2012-06-01 08:05:04 UTC (rev 2695)
@@ -16,3 +16,5 @@
sid: needed "no upstream fix as of 2011.06.20"
2.6.26-lenny-security: needed "no upstream fix as of 2011.06.20"
2.6.32-squeeze-security: needed "no upstream fix as of 2011.06.20"
+3.2-upstream-stable: needed "no upstream fix as of 2011.06.20"
+
Modified: active/CVE-2011-2695
===================================================================
--- active/CVE-2011-2695 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-2695 2012-06-01 08:05:04 UTC (rev 2695)
@@ -10,3 +10,4 @@
sid: released (3.0.0-1)
2.6.26-lenny-security: needed
2.6.32-squeeze-security: needed
+3.2-upstream-stable: N/A
Modified: active/CVE-2011-2699
===================================================================
--- active/CVE-2011-2699 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-2699 2012-06-01 08:05:04 UTC (rev 2695)
@@ -12,3 +12,4 @@
sid: released (3.0.0-2) [bugfix/all/stable/3.0.2.patch]
2.6.26-lenny-security: ignored "end of life"
2.6.32-squeeze-security: released (2.6.32-41)
+3.2-upstream-stable: N/A
Modified: active/CVE-2011-3347
===================================================================
--- active/CVE-2011-3347 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-3347 2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
2.6.32-upstream-stable:
sid: released (3.2-1)
2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
+3.2-upstream-stable: N/A
Modified: active/CVE-2011-4077
===================================================================
--- active/CVE-2011-4077 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4077 2012-06-01 08:05:04 UTC (rev 2695)
@@ -11,3 +11,4 @@
sid: released (3.0.0-6) [bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink.patch, bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink-2.patch]
2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
+3.2-upstream-stable: N/A
Modified: active/CVE-2011-4086
===================================================================
--- active/CVE-2011-4086 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4086 2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,4 @@
2.6.32-upstream-stable: needed
sid: released (3.2-1)
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_buffer.patch]
+3.2-upstream-stable: N/A
Modified: active/CVE-2011-4110
===================================================================
--- active/CVE-2011-4110 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4110 2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
sid: released (3.1.4-1)
2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]
2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/KEYS-Fix-a-NULL-pointer-deref-in-the-user-defined-key-type.patch]
+3.2-upstream-stable: N/A
Modified: active/CVE-2011-4131
===================================================================
--- active/CVE-2011-4131 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4131 2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,4 @@
2.6.32-upstream-stable: needed "partial fix in 2.6.32.44"
sid: released (3.2.9-1)
2.6.32-squeeze-security: needed "partial fix in 2.6.32-36"
+3.2-upstream-stable:
Modified: active/CVE-2011-4347
===================================================================
--- active/CVE-2011-4347 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4347 2012-06-01 08:05:04 UTC (rev 2695)
@@ -13,3 +13,4 @@
sid: released (3.2.1-1)
2.6.26-lenny-security: N/A "code not present"
2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/KVM-Remove-ability-to-assign-a-device-without-iommu-support.patch, bugfix/all/KVM-Device-assignment-permission-checks.patch
+3.2-upstream-stable: N/A
Modified: active/CVE-2011-4621
===================================================================
--- active/CVE-2011-4621 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4621 2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
2.6.32-upstream-stable: needed
sid: released (2.6.37-1)
2.6.32-squeeze-security: needed
+3.2-upstream-stable: N/A
Modified: active/CVE-2011-4622
===================================================================
--- active/CVE-2011-4622 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4622 2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
sid: released (3.1.8-1)
2.6.26-lenny-security: released (2.6.26-28) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]
2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]
+3.2-upstream-stable: N/A
Modified: active/CVE-2011-4914
===================================================================
--- active/CVE-2011-4914 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4914 2012-06-01 08:05:04 UTC (rev 2695)
@@ -10,3 +10,4 @@
sid: released (2.6.39-1)
2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]
2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]
+3.2-upstream-stable: N/A
Modified: active/CVE-2011-4915
===================================================================
--- active/CVE-2011-4915 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4915 2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,4 +7,5 @@
upstream:
2.6.32-upstream-stable:
sid:
-2.6.32-squeeze-security: ignored (2.6.32-44) "patch not accepted upstream"
\ No newline at end of file
+2.6.32-squeeze-security: ignored (2.6.32-44) "patch not accepted upstream"
+3.2-upstream-stable:
Modified: active/CVE-2011-4917
===================================================================
--- active/CVE-2011-4917 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2011-4917 2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security: ignored (2.6.32-44) "patch not accepted upstream"
+3.2-upstream-stable:
Modified: active/CVE-2012-0044
===================================================================
--- active/CVE-2012-0044 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-0044 2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,4 @@
sid: released (3.1.5-1)
2.6.26-lenny-security: N/A "vulnerable code not present"
2.6.32-squeeze-security: released (2.6.32-41)
+3.2-upstream-stable: N/A
Modified: active/CVE-2012-0045
===================================================================
--- active/CVE-2012-0045 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-0045 2012-06-01 08:05:04 UTC (rev 2695)
@@ -10,3 +10,4 @@
sid: released (3.2.2-1) [bugfix/x86/KVM-x86-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-x86-fix-missing-checks-in-syscall-emulation.patch]
2.6.26-lenny-security: N/A "Introduced in 2.6.32"
2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/x86/KVM-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-fix-missing-checks-in-syscall-emulation.patch]
+3.2-upstream-stable:
Modified: active/CVE-2012-0879
===================================================================
--- active/CVE-2012-0879 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-0879 2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,4 +8,5 @@
2.6.32-upstream-stable: needed
sid: released (2.6.33-1)
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch]
+3.2-upstream-stable: N/A
Modified: active/CVE-2012-1090
===================================================================
--- active/CVE-2012-1090 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-1090 2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,4 @@
2.6.32-upstream-stable: needed
sid: released (3.2.10-1)
2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/cifs-fix-dentry-refcount-leak-when-opening-a-FIFO-on.patch]
+3.2-upstream-stable:
\ No newline at end of file
Modified: active/CVE-2012-1179
===================================================================
--- active/CVE-2012-1179 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-1179 2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,4 @@
2.6.32-upstream-stable: needed
sid: released (3.2.14-1)
2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
+3.2-upstream-stable:
Modified: active/CVE-2012-1601
===================================================================
--- active/CVE-2012-1601 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-1601 2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,5 @@
2.6.32-upstream-stable:
sid: pending (3.2.17-1) [bugfix/all/kvm-ensure-all-vcpus-are-consistent-with-in-kernel-irqchip.patch]
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch]
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2119
===================================================================
--- active/CVE-2012-2119 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2119 2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,5 @@
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security: ignored (2.6.32-44) "not upstream yet"
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2121
===================================================================
--- active/CVE-2012-2121 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2121 2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,5 @@
2.6.32-upstream-stable:
sid: pending (3.2.17-1) [bugfix/all/kvm-lock-slots_lock-around-device-assignment.patch]
2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2123
===================================================================
--- active/CVE-2012-2123 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2123 2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,5 @@
2.6.32-upstream-stable:
sid: released (3.2.16-1)
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch]
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2133
===================================================================
--- active/CVE-2012-2133 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2133 2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,5 @@
2.6.32-upstream-stable: needed
sid: needed
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2136
===================================================================
--- active/CVE-2012-2136 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2136 2012-06-01 08:05:04 UTC (rev 2695)
@@ -8,3 +8,5 @@
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security:
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2313
===================================================================
--- active/CVE-2012-2313 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2313 2012-06-01 08:05:04 UTC (rev 2695)
@@ -10,3 +10,5 @@
2.6.32-upstream-stable: needed
sid: pending (3.2.19-1)
2.6.32-squeeze-security: needed
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2319
===================================================================
--- active/CVE-2012-2319 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2319 2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,5 @@
2.6.32-upstream-stable: needed
sid: pending (3.2.17-1)
2.6.32-squeeze-security: needed
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2373
===================================================================
--- active/CVE-2012-2373 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2373 2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,5 @@
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security:
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2375
===================================================================
--- active/CVE-2012-2375 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2375 2012-06-01 08:05:04 UTC (rev 2695)
@@ -7,3 +7,5 @@
2.6.32-upstream-stable:
sid: pending (3.2.19-1)
2.6.32-squeeze-security:
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2383
===================================================================
--- active/CVE-2012-2383 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2383 2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,5 @@
2.6.32-upstream-stable: N/A "Introduced in 2.6.39 with 8408c282"
sid: released (3.2.17-1)
2.6.32-squeeze-security: N/A "Introduced in 2.6.39 with 8408c282"
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2384
===================================================================
--- active/CVE-2012-2384 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2384 2012-06-01 08:05:04 UTC (rev 2695)
@@ -6,3 +6,5 @@
2.6.32-upstream-stable: N/A "Introduced in 2.6.38 with 432e58ed"
sid: released (3.2.17-1)
2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 432e58ed"
+3.2-upstream-stable:
+
Modified: active/CVE-2012-2390
===================================================================
--- active/CVE-2012-2390 2012-06-01 03:48:54 UTC (rev 2694)
+++ active/CVE-2012-2390 2012-06-01 08:05:04 UTC (rev 2695)
@@ -9,3 +9,4 @@
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security:
+3.2-upstream-stable:
More information about the kernel-sec-discuss
mailing list