[kernel-sec-discuss] r2757 - active
Moritz Muehlenhoff
jmm at alioth.debian.org
Mon Oct 1 08:30:38 UTC 2012
Author: jmm
Date: 2012-10-01 08:30:16 +0000 (Mon, 01 Oct 2012)
New Revision: 2757
Modified:
active/CVE-2012-2136
active/CVE-2012-2313
active/CVE-2012-2319
active/CVE-2012-2390
active/CVE-2012-2745
active/CVE-2012-3400
active/CVE-2012-3412
active/CVE-2012-3430
Log:
fixes from 6.0.6 point update
Modified: active/CVE-2012-2136
===================================================================
--- active/CVE-2012-2136 2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-2136 2012-10-01 08:30:16 UTC (rev 2757)
@@ -7,5 +7,5 @@
upstream: released (v3.5-rc1) [cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc]
2.6.32-upstream-stable:
sid: released (3.2.20-1)
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/net-sock-validate-data_len-before-allocating-skb-in-sock_alloc_send_pskb.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/net-sock-validate-data_len-before-allocating-skb-in-sock_alloc_send_pskb.patch]
3.2-upstream-stable: released (3.2.23)
Modified: active/CVE-2012-2313
===================================================================
--- active/CVE-2012-2313 2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-2313 2012-10-01 08:30:16 UTC (rev 2757)
@@ -9,5 +9,5 @@
upstream: released (3.4-rc4) [1bb57e940e1958e40d51f2078f50c3a96a9b2d75]
2.6.32-upstream-stable: needed
sid: released (3.2.19-1)
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/dl2k-use-standard-defines-from-mii.h.patch, bugfix/all/dl2k-Clean-up-rio_ioctl.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/dl2k-use-standard-defines-from-mii.h.patch, bugfix/all/dl2k-Clean-up-rio_ioctl.patch]
3.2-upstream-stable: released (3.2.19) [bdd06be083b51fa7bdf04d8c8b699870f29bae69]
Modified: active/CVE-2012-2319
===================================================================
--- active/CVE-2012-2319 2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-2319 2012-10-01 08:30:16 UTC (rev 2757)
@@ -5,5 +5,5 @@
upstream: released (3.4-rc6) [6f24f892871acc47b40dd594c63606a17c714f77]
2.6.32-upstream-stable: needed
sid: released (3.2.17-1)
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/hfsplus-Fix-potential-buffer-overflows.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/hfsplus-Fix-potential-buffer-overflows.patch]
3.2-upstream-stable: released (3.2.17) [d4af6eb924ce29b9e46037134ca69ce085b5c36c]
Modified: active/CVE-2012-2390
===================================================================
--- active/CVE-2012-2390 2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-2390 2012-10-01 08:30:16 UTC (rev 2757)
@@ -8,5 +8,5 @@
upstream: released (3.5-rc1) [4523e1458566a0e8ecfaff90f380dd23acc44d27, c50ac050811d6485616a193eb0f37bfbd191cc89]
2.6.32-upstream-stable:
sid: released (3.2.19-1) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-null-pointer.patch]
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-NULL-pointer.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-NULL-pointer.patch]
3.2-upstream-stable: released (3.2.20) [queue-3.2/hugetlb-fix-resv_map-leak-in-error-path.patch, queue-3.2/mm-fix-vma_resv_map-null-pointer.patch]
Modified: active/CVE-2012-2745
===================================================================
--- active/CVE-2012-2745 2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-2745 2012-10-01 08:30:16 UTC (rev 2757)
@@ -6,5 +6,5 @@
upstream: released (3.4) [79549c6dfda0603dba9a70a53467ce62d9335c33]
2.6.32-upstream-stable: needed
sid: released (3.2.15-1)
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/cred-copy_process-should-clear-child-replacement_session_keyring.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/cred-copy_process-should-clear-child-replacement_session_keyring.patch]
3.2-upstream-stable: released (3.2.15)
Modified: active/CVE-2012-3400
===================================================================
--- active/CVE-2012-3400 2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-3400 2012-10-01 08:30:16 UTC (rev 2757)
@@ -5,5 +5,5 @@
upstream: released (3.5-rc5) [1df2ae31c724e57be9d7ac00d78db8a5dabdd050, adee11b2085bee90bd8f4f52123ffb07882d6256]
2.6.32-upstream-stable: needed
sid: released (3.2.23-1)
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/udf-Fortify-loading-of-sparing-table.patch, bugfix/all/udf-Avoid-run-away-loop-when-partition-table-length-is-corrupted.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/udf-Fortify-loading-of-sparing-table.patch, bugfix/all/udf-Avoid-run-away-loop-when-partition-table-length-is-corrupted.patch]
3.2-upstream-stable: released (3.2.23)
Modified: active/CVE-2012-3412
===================================================================
--- active/CVE-2012-3412 2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-3412 2012-10-01 08:30:16 UTC (rev 2757)
@@ -14,5 +14,5 @@
upstream: released (3.6-rc2) [30b678d844af3305cda5953467005cebb5d7b687, 7e6d06f0de3f74ca929441add094518ae332257c, 7e6d06f0de3f74ca929441add094518ae332257c]
2.6.32-upstream-stable:
sid: released (3.2.29-1) [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
-2.6.32-squeeze-security: pending [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
+2.6.32-squeeze-security: released [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
3.2-upstream-stable: pending [net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, tcp-apply-device-tso-segment-limit-earlier.patch]
Modified: active/CVE-2012-3430
===================================================================
--- active/CVE-2012-3430 2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-3430 2012-10-01 08:30:16 UTC (rev 2757)
@@ -5,5 +5,5 @@
upstream: released (3.6-rc1) [06b6a1cf6e776426766298d055bb3991957d90a7]
2.6.32-upstream-stable: needed
sid: released (3.2.29-1) [bugfix/all/rds-set-correct-msg_namelen.patch]
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/rds-set-correct-msg_namelen.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/rds-set-correct-msg_namelen.patch]
3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list