[kernel-sec-discuss] r2685 - active

Ben Hutchings benh at alioth.debian.org
Sat May 12 13:42:34 UTC 2012


Author: benh
Date: 2012-05-12 13:42:33 +0000 (Sat, 12 May 2012)
New Revision: 2685

Modified:
   active/CVE-2011-4086
   active/CVE-2012-0810
   active/CVE-2012-0879
   active/CVE-2012-1601
   active/CVE-2012-2100
   active/CVE-2012-2121
   active/CVE-2012-2123
   active/CVE-2012-2133
   active/CVE-2012-2319
Log:
Mark various fixes pending/released

Modified: active/CVE-2011-4086
===================================================================
--- active/CVE-2011-4086	2012-05-10 21:07:14 UTC (rev 2684)
+++ active/CVE-2011-4086	2012-05-12 13:42:33 UTC (rev 2685)
@@ -5,4 +5,4 @@
 upstream: released (3.2) [15291164b22a357cb211b618adfef4fa82fc0de3]
 2.6.32-upstream-stable: needed
 sid: released (3.2-1)
-2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_buffer.patch]
+2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_buffer.patch]

Modified: active/CVE-2012-0810
===================================================================
--- active/CVE-2012-0810	2012-05-10 21:07:14 UTC (rev 2684)
+++ active/CVE-2012-0810	2012-05-12 13:42:33 UTC (rev 2685)
@@ -6,5 +6,5 @@
 Bugs:
 upstream: N/A "rt patchset not yet merged upstream"
 2.6.32-upstream-stable: N/A "rt patchset not present"
-sid:
+sid: released (3.2.9-1) [features/all/rt/oleg-signal-rt-fix.patch, features/all/rt/fix-rt-int3-x86_32-3.2-rt.patch]
 2.6.32-squeeze-security: N/A "rt patchset not present"

Modified: active/CVE-2012-0879
===================================================================
--- active/CVE-2012-0879	2012-05-10 21:07:14 UTC (rev 2684)
+++ active/CVE-2012-0879	2012-05-12 13:42:33 UTC (rev 2685)
@@ -7,5 +7,5 @@
 upstream: released (2.6.33) [61cc74fbb87af6aa551a06a370590c9bc07e29d9, b69f2292063d2caf37ca9aec7d63ded203701bf3]
 2.6.32-upstream-stable: needed
 sid: released (2.6.33-1)
-2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch]
+2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch]
 

Modified: active/CVE-2012-1601
===================================================================
--- active/CVE-2012-1601	2012-05-10 21:07:14 UTC (rev 2684)
+++ active/CVE-2012-1601	2012-05-12 13:42:33 UTC (rev 2685)
@@ -6,5 +6,5 @@
 Bugs:
 upstream: released (3.4-rc1) [3e515705a1f46beb1c942bb8043c16f8ac7b1e9e]
 2.6.32-upstream-stable:
-sid: needed
-2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch]
+sid: pending (3.2.17-1) [bugfix/all/kvm-ensure-all-vcpus-are-consistent-with-in-kernel-irqchip.patch]
+2.6.32-squeeze-security: released (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch]

Modified: active/CVE-2012-2100
===================================================================
--- active/CVE-2012-2100	2012-05-10 21:07:14 UTC (rev 2684)
+++ active/CVE-2012-2100	2012-05-12 13:42:33 UTC (rev 2685)
@@ -4,5 +4,5 @@
 Bugs:
 upstream: released (3.3) [d50f2ab6f050311dbf7b8f5501b25f0bf64a439b]
 2.6.32-upstream-stable: released (2.6.32.55)
-sid:
+sid: released (3.2.2-1)
 2.6.32-squeeze-security: released (2.6.32-41squeeze1)

Modified: active/CVE-2012-2121
===================================================================
--- active/CVE-2012-2121	2012-05-10 21:07:14 UTC (rev 2684)
+++ active/CVE-2012-2121	2012-05-12 13:42:33 UTC (rev 2685)
@@ -4,5 +4,5 @@
 Bugs:
 upstream: released (3.4-rc4) [32f6daad4651a748a58a3ab6da0611862175722f, 21a1416a1c945c5aeaeaf791b63c64926018eb77]
 2.6.32-upstream-stable:
-sid:
+sid: pending (3.2.17-1) [bugfix/all/kvm-lock-slots_lock-around-device-assignment.patch]
 2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"

Modified: active/CVE-2012-2123
===================================================================
--- active/CVE-2012-2123	2012-05-10 21:07:14 UTC (rev 2684)
+++ active/CVE-2012-2123	2012-05-12 13:42:33 UTC (rev 2685)
@@ -4,5 +4,5 @@
 Bugs:
 upstream: released (3.4-rc4) [d52fc5dde171f030170a6cb78034d166b13c9445, 51b79bee627d526199b2f6a6bef8ee0c0739b6d1]
 2.6.32-upstream-stable:
-sid:
-2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch]
+sid: released (3.2.16-1)
+2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch]

Modified: active/CVE-2012-2133
===================================================================
--- active/CVE-2012-2133	2012-05-10 21:07:14 UTC (rev 2684)
+++ active/CVE-2012-2133	2012-05-12 13:42:33 UTC (rev 2685)
@@ -6,4 +6,4 @@
 upstream: released (3.4-rc1) [90481622d75715bfcb68501280a917dbfe516029]
 2.6.32-upstream-stable: needed
 sid: needed
-2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
+2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]

Modified: active/CVE-2012-2319
===================================================================
--- active/CVE-2012-2319	2012-05-10 21:07:14 UTC (rev 2684)
+++ active/CVE-2012-2319	2012-05-12 13:42:33 UTC (rev 2685)
@@ -4,5 +4,5 @@
 Bugs:
 upstream: released (3.4-rc6) [6f24f892871acc47b40dd594c63606a17c714f77]
 2.6.32-upstream-stable: needed
-sid: needed
+sid: pending (3.2.17-1)
 2.6.32-squeeze-security: needed




More information about the kernel-sec-discuss mailing list