[kernel-sec-discuss] r2697 - active
Ben Hutchings
benh at alioth.debian.org
Fri Jun 1 15:32:15 UTC 2012
Author: benh
Date: 2012-06-01 15:32:14 +0000 (Fri, 01 Jun 2012)
New Revision: 2697
Modified:
active/CVE-2011-1083
active/CVE-2011-4131
active/CVE-2012-0045
active/CVE-2012-1090
active/CVE-2012-1179
active/CVE-2012-1601
active/CVE-2012-2121
active/CVE-2012-2123
active/CVE-2012-2133
active/CVE-2012-2313
active/CVE-2012-2319
active/CVE-2012-2373
active/CVE-2012-2375
active/CVE-2012-2383
active/CVE-2012-2384
active/CVE-2012-2390
Log:
Set 3.2-upstream-stable status for all active issues
Modified: active/CVE-2011-1083
===================================================================
--- active/CVE-2011-1083 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2011-1083 2012-06-01 15:32:14 UTC (rev 2697)
@@ -9,5 +9,5 @@
2.6.32-upstream-stable: needed
sid: released (3.2.9-1)
2.6.32-squeeze-security: needed
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.9) [203aa5260edca2ab1872ad8b08386d874f7132f3]
Modified: active/CVE-2011-4131
===================================================================
--- active/CVE-2011-4131 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2011-4131 2012-06-01 15:32:14 UTC (rev 2697)
@@ -5,6 +5,6 @@
Bugs:
upstream: released (3.3-rc5) [e5012d1f3861d18c7f3814e757c1c3ab3741dbcd, bf118a342f10dafe44b14451a1392c3254629a1f, de040beccd52bb5fcac90031505384d037b1111c, 331818f1c468a24e581aedcbe52af799366a9dfe]
2.6.32-upstream-stable: needed "partial fix in 2.6.32.44"
-sid: released (3.2.9-1)
+sid: released (3.2.19-1)
2.6.32-squeeze-security: needed "partial fix in 2.6.32-36"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.19) [e5012d1f3861d18c7f3814e757c1c3ab3741dbcd, 4a818b4288d5a897b0e928dd0cd1e1e29501159f, 4910b0c6a122dade90898c079027423a3204ac44, 84e017e3ff4113a32c827f2d7f96e1a9b1f7a677]
Modified: active/CVE-2012-0045
===================================================================
--- active/CVE-2012-0045 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-0045 2012-06-01 15:32:14 UTC (rev 2697)
@@ -10,4 +10,4 @@
sid: released (3.2.2-1) [bugfix/x86/KVM-x86-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-x86-fix-missing-checks-in-syscall-emulation.patch]
2.6.26-lenny-security: N/A "Introduced in 2.6.32"
2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/x86/KVM-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-fix-missing-checks-in-syscall-emulation.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.14) [90509a557798a023b3f5c46bebae62aa00e5da2a, c401f604a75970a1e5c2718232b3c4c2060a3ee8]
Modified: active/CVE-2012-1090
===================================================================
--- active/CVE-2012-1090 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-1090 2012-06-01 15:32:14 UTC (rev 2697)
@@ -8,4 +8,4 @@
2.6.32-upstream-stable: needed
sid: released (3.2.10-1)
2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/cifs-fix-dentry-refcount-leak-when-opening-a-FIFO-on.patch]
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable: released (3.2.10) [88d7d4e4a439f32acc56a6d860e415ee71d3df08]
Modified: active/CVE-2012-1179
===================================================================
--- active/CVE-2012-1179 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-1179 2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,4 +6,4 @@
2.6.32-upstream-stable: needed
sid: released (3.2.14-1)
2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.14) [c6cf24ba30c7225667827245cfd2bc98f7f5ed2b]
Modified: active/CVE-2012-1601
===================================================================
--- active/CVE-2012-1601 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-1601 2012-06-01 15:32:14 UTC (rev 2697)
@@ -8,5 +8,5 @@
2.6.32-upstream-stable:
sid: pending (3.2.17-1) [bugfix/all/kvm-ensure-all-vcpus-are-consistent-with-in-kernel-irqchip.patch]
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.19) [645b177cbfce6b695bdbe0b4c131de584821840d]
Modified: active/CVE-2012-2121
===================================================================
--- active/CVE-2012-2121 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2121 2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable:
sid: pending (3.2.17-1) [bugfix/all/kvm-lock-slots_lock-around-device-assignment.patch]
2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.19) [1e57aab4e6c549804298f07fac0b6fc77f10fab2, 50fcec93e8c917b4f6e1a3219207d351e6eae1b2]
Modified: active/CVE-2012-2123
===================================================================
--- active/CVE-2012-2123 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2123 2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable:
sid: released (3.2.16-1)
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.16) [f2c309c36d0a433c88534082cb2c3a817d6bd409, fd18a0805b2b68228c0493337000f63c2573cc0c]
Modified: active/CVE-2012-2133
===================================================================
--- active/CVE-2012-2133 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2133 2012-06-01 15:32:14 UTC (rev 2697)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable: needed
sid: released (3.2.19-1) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
-3.2-upstream-stable:
+3.2-upstream-stable: needed
Modified: active/CVE-2012-2313
===================================================================
--- active/CVE-2012-2313 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2313 2012-06-01 15:32:14 UTC (rev 2697)
@@ -10,5 +10,5 @@
2.6.32-upstream-stable: needed
sid: pending (3.2.19-1)
2.6.32-squeeze-security: needed
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.19) [bdd06be083b51fa7bdf04d8c8b699870f29bae69]
Modified: active/CVE-2012-2319
===================================================================
--- active/CVE-2012-2319 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2319 2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: needed
sid: pending (3.2.17-1)
2.6.32-squeeze-security: needed
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.17) [d4af6eb924ce29b9e46037134ca69ce085b5c36c]
Modified: active/CVE-2012-2373
===================================================================
--- active/CVE-2012-2373 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2373 2012-06-01 15:32:14 UTC (rev 2697)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable:
sid: released (3.2.19-1) [bugfix/x86/mm-pmd_read_atomic-fix-32bit-pae-pmd-walk-vs-pmd_populate-smp-race.patch]
2.6.32-squeeze-security:
-3.2-upstream-stable:
+3.2-upstream-stable: pending [queue-3.2/mm-pmd_read_atomic-fix-32bit-pae-pmd-walk-vs-pmd_populate-smp-race.patch]
Modified: active/CVE-2012-2375
===================================================================
--- active/CVE-2012-2375 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2375 2012-06-01 15:32:14 UTC (rev 2697)
@@ -7,5 +7,5 @@
2.6.32-upstream-stable:
sid: pending (3.2.19-1)
2.6.32-squeeze-security:
-3.2-upstream-stable:
+3.2-upstream-stable: releaed (3.2.19) [a94841724154dac38ce5239d1d88c00e758dc20d, b7d52ac86a9753520a696af25d333e3451eeae92, 84e017e3ff4113a32c827f2d7f96e1a9b1f7a677]
Modified: active/CVE-2012-2383
===================================================================
--- active/CVE-2012-2383 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2383 2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: N/A "Introduced in 2.6.39 with 8408c282"
sid: released (3.2.17-1)
2.6.32-squeeze-security: N/A "Introduced in 2.6.39 with 8408c282"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.17) [a9206caacef21a1eeee7083d8fb188cfeb15fd52]
Modified: active/CVE-2012-2384
===================================================================
--- active/CVE-2012-2384 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2384 2012-06-01 15:32:14 UTC (rev 2697)
@@ -6,5 +6,5 @@
2.6.32-upstream-stable: N/A "Introduced in 2.6.38 with 432e58ed"
sid: released (3.2.17-1)
2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 432e58ed"
-3.2-upstream-stable:
+3.2-upstream-stable: released (3.2.17) [c9b310ee2b2a50ffaa6ea0ca9226c64a12ed0c54]
Modified: active/CVE-2012-2390
===================================================================
--- active/CVE-2012-2390 2012-06-01 15:16:03 UTC (rev 2696)
+++ active/CVE-2012-2390 2012-06-01 15:32:14 UTC (rev 2697)
@@ -9,4 +9,4 @@
2.6.32-upstream-stable:
sid: released (3.2.19-1) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-null-pointer.patch]
2.6.32-squeeze-security:
-3.2-upstream-stable:
+3.2-upstream-stable: pending [queue-3.2/hugetlb-fix-resv_map-leak-in-error-path.patch, queue-3.2/mm-fix-vma_resv_map-null-pointer.patch]
More information about the kernel-sec-discuss
mailing list