[kernel-sec-discuss] r2697 - active

Ben Hutchings benh at alioth.debian.org
Fri Jun 1 15:32:15 UTC 2012


Author: benh
Date: 2012-06-01 15:32:14 +0000 (Fri, 01 Jun 2012)
New Revision: 2697

Modified:
   active/CVE-2011-1083
   active/CVE-2011-4131
   active/CVE-2012-0045
   active/CVE-2012-1090
   active/CVE-2012-1179
   active/CVE-2012-1601
   active/CVE-2012-2121
   active/CVE-2012-2123
   active/CVE-2012-2133
   active/CVE-2012-2313
   active/CVE-2012-2319
   active/CVE-2012-2373
   active/CVE-2012-2375
   active/CVE-2012-2383
   active/CVE-2012-2384
   active/CVE-2012-2390
Log:
Set 3.2-upstream-stable status for all active issues

Modified: active/CVE-2011-1083
===================================================================
--- active/CVE-2011-1083	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2011-1083	2012-06-01 15:32:14 UTC (rev 2697)
@@ -9,5 +9,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.9-1)
 2.6.32-squeeze-security: needed
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.9) [203aa5260edca2ab1872ad8b08386d874f7132f3]
 

Modified: active/CVE-2011-4131
===================================================================
--- active/CVE-2011-4131	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2011-4131	2012-06-01 15:32:14 UTC (rev 2697)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (3.3-rc5) [e5012d1f3861d18c7f3814e757c1c3ab3741dbcd, bf118a342f10dafe44b14451a1392c3254629a1f, de040beccd52bb5fcac90031505384d037b1111c, 331818f1c468a24e581aedcbe52af799366a9dfe]
 2.6.32-upstream-stable: needed "partial fix in 2.6.32.44"
-sid: released (3.2.9-1)
+sid: released (3.2.19-1)
 2.6.32-squeeze-security: needed "partial fix in 2.6.32-36"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.19) [e5012d1f3861d18c7f3814e757c1c3ab3741dbcd, 4a818b4288d5a897b0e928dd0cd1e1e29501159f, 4910b0c6a122dade90898c079027423a3204ac44, 84e017e3ff4113a32c827f2d7f96e1a9b1f7a677]

Modified: active/CVE-2012-0045
===================================================================
--- active/CVE-2012-0045	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-0045	2012-06-01 15:32:14 UTC (rev 2697)
@@ -10,4 +10,4 @@
 sid: released (3.2.2-1) [bugfix/x86/KVM-x86-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-x86-fix-missing-checks-in-syscall-emulation.patch]
 2.6.26-lenny-security: N/A "Introduced in 2.6.32"
 2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/x86/KVM-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-fix-missing-checks-in-syscall-emulation.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.14) [90509a557798a023b3f5c46bebae62aa00e5da2a, c401f604a75970a1e5c2718232b3c4c2060a3ee8]

Modified: active/CVE-2012-1090
===================================================================
--- active/CVE-2012-1090	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-1090	2012-06-01 15:32:14 UTC (rev 2697)
@@ -8,4 +8,4 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.10-1)
 2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/cifs-fix-dentry-refcount-leak-when-opening-a-FIFO-on.patch]
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.10) [88d7d4e4a439f32acc56a6d860e415ee71d3df08]

Modified: active/CVE-2012-1179
===================================================================
--- active/CVE-2012-1179	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-1179	2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,4 +6,4 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.14-1)
 2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.14) [c6cf24ba30c7225667827245cfd2bc98f7f5ed2b]

Modified: active/CVE-2012-1601
===================================================================
--- active/CVE-2012-1601	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-1601	2012-06-01 15:32:14 UTC (rev 2697)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable:
 sid: pending (3.2.17-1) [bugfix/all/kvm-ensure-all-vcpus-are-consistent-with-in-kernel-irqchip.patch]
 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.19) [645b177cbfce6b695bdbe0b4c131de584821840d]
 

Modified: active/CVE-2012-2121
===================================================================
--- active/CVE-2012-2121	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2121	2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable:
 sid: pending (3.2.17-1) [bugfix/all/kvm-lock-slots_lock-around-device-assignment.patch]
 2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.19) [1e57aab4e6c549804298f07fac0b6fc77f10fab2, 50fcec93e8c917b4f6e1a3219207d351e6eae1b2]
 

Modified: active/CVE-2012-2123
===================================================================
--- active/CVE-2012-2123	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2123	2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable:
 sid: released (3.2.16-1)
 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.16) [f2c309c36d0a433c88534082cb2c3a817d6bd409, fd18a0805b2b68228c0493337000f63c2573cc0c]
 

Modified: active/CVE-2012-2133
===================================================================
--- active/CVE-2012-2133	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2133	2012-06-01 15:32:14 UTC (rev 2697)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.19-1) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: needed
 

Modified: active/CVE-2012-2313
===================================================================
--- active/CVE-2012-2313	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2313	2012-06-01 15:32:14 UTC (rev 2697)
@@ -10,5 +10,5 @@
 2.6.32-upstream-stable: needed
 sid: pending (3.2.19-1)
 2.6.32-squeeze-security: needed
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.19) [bdd06be083b51fa7bdf04d8c8b699870f29bae69]
 

Modified: active/CVE-2012-2319
===================================================================
--- active/CVE-2012-2319	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2319	2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: needed
 sid: pending (3.2.17-1)
 2.6.32-squeeze-security: needed
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.17) [d4af6eb924ce29b9e46037134ca69ce085b5c36c]
 

Modified: active/CVE-2012-2373
===================================================================
--- active/CVE-2012-2373	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2373	2012-06-01 15:32:14 UTC (rev 2697)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable:
 sid: released (3.2.19-1) [bugfix/x86/mm-pmd_read_atomic-fix-32bit-pae-pmd-walk-vs-pmd_populate-smp-race.patch]
 2.6.32-squeeze-security:
-3.2-upstream-stable:
+3.2-upstream-stable: pending [queue-3.2/mm-pmd_read_atomic-fix-32bit-pae-pmd-walk-vs-pmd_populate-smp-race.patch]
 

Modified: active/CVE-2012-2375
===================================================================
--- active/CVE-2012-2375	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2375	2012-06-01 15:32:14 UTC (rev 2697)
@@ -7,5 +7,5 @@
 2.6.32-upstream-stable:
 sid: pending (3.2.19-1)
 2.6.32-squeeze-security:
-3.2-upstream-stable:
+3.2-upstream-stable: releaed (3.2.19) [a94841724154dac38ce5239d1d88c00e758dc20d, b7d52ac86a9753520a696af25d333e3451eeae92, 84e017e3ff4113a32c827f2d7f96e1a9b1f7a677]
 

Modified: active/CVE-2012-2383
===================================================================
--- active/CVE-2012-2383	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2383	2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: N/A "Introduced in 2.6.39 with 8408c282"
 sid: released (3.2.17-1)
 2.6.32-squeeze-security: N/A "Introduced in 2.6.39 with 8408c282"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.17) [a9206caacef21a1eeee7083d8fb188cfeb15fd52]
 

Modified: active/CVE-2012-2384
===================================================================
--- active/CVE-2012-2384	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2384	2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,5 +6,5 @@
 2.6.32-upstream-stable: N/A "Introduced in 2.6.38 with 432e58ed"
 sid: released (3.2.17-1)
 2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 432e58ed"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.17) [c9b310ee2b2a50ffaa6ea0ca9226c64a12ed0c54]
 

Modified: active/CVE-2012-2390
===================================================================
--- active/CVE-2012-2390	2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2390	2012-06-01 15:32:14 UTC (rev 2697)
@@ -9,4 +9,4 @@
 2.6.32-upstream-stable:
 sid: released (3.2.19-1) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-null-pointer.patch]
 2.6.32-squeeze-security:
-3.2-upstream-stable:
+3.2-upstream-stable: pending [queue-3.2/hugetlb-fix-resv_map-leak-in-error-path.patch, queue-3.2/mm-fix-vma_resv_map-null-pointer.patch]




More information about the kernel-sec-discuss mailing list