[kernel-sec-discuss] r2757 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Oct 1 08:30:38 UTC 2012


Author: jmm
Date: 2012-10-01 08:30:16 +0000 (Mon, 01 Oct 2012)
New Revision: 2757

Modified:
   active/CVE-2012-2136
   active/CVE-2012-2313
   active/CVE-2012-2319
   active/CVE-2012-2390
   active/CVE-2012-2745
   active/CVE-2012-3400
   active/CVE-2012-3412
   active/CVE-2012-3430
Log:
fixes from 6.0.6 point update


Modified: active/CVE-2012-2136
===================================================================
--- active/CVE-2012-2136	2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-2136	2012-10-01 08:30:16 UTC (rev 2757)
@@ -7,5 +7,5 @@
 upstream: released (v3.5-rc1) [cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc]
 2.6.32-upstream-stable:
 sid: released (3.2.20-1)
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/net-sock-validate-data_len-before-allocating-skb-in-sock_alloc_send_pskb.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/net-sock-validate-data_len-before-allocating-skb-in-sock_alloc_send_pskb.patch]
 3.2-upstream-stable: released (3.2.23)

Modified: active/CVE-2012-2313
===================================================================
--- active/CVE-2012-2313	2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-2313	2012-10-01 08:30:16 UTC (rev 2757)
@@ -9,5 +9,5 @@
 upstream: released (3.4-rc4) [1bb57e940e1958e40d51f2078f50c3a96a9b2d75]
 2.6.32-upstream-stable: needed
 sid: released (3.2.19-1)
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/dl2k-use-standard-defines-from-mii.h.patch, bugfix/all/dl2k-Clean-up-rio_ioctl.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/dl2k-use-standard-defines-from-mii.h.patch, bugfix/all/dl2k-Clean-up-rio_ioctl.patch]
 3.2-upstream-stable: released (3.2.19) [bdd06be083b51fa7bdf04d8c8b699870f29bae69]

Modified: active/CVE-2012-2319
===================================================================
--- active/CVE-2012-2319	2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-2319	2012-10-01 08:30:16 UTC (rev 2757)
@@ -5,5 +5,5 @@
 upstream: released (3.4-rc6) [6f24f892871acc47b40dd594c63606a17c714f77]
 2.6.32-upstream-stable: needed
 sid: released (3.2.17-1)
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/hfsplus-Fix-potential-buffer-overflows.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/hfsplus-Fix-potential-buffer-overflows.patch]
 3.2-upstream-stable: released (3.2.17) [d4af6eb924ce29b9e46037134ca69ce085b5c36c]

Modified: active/CVE-2012-2390
===================================================================
--- active/CVE-2012-2390	2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-2390	2012-10-01 08:30:16 UTC (rev 2757)
@@ -8,5 +8,5 @@
 upstream: released (3.5-rc1) [4523e1458566a0e8ecfaff90f380dd23acc44d27, c50ac050811d6485616a193eb0f37bfbd191cc89]
 2.6.32-upstream-stable:
 sid: released (3.2.19-1) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-null-pointer.patch]
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-NULL-pointer.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/hugetlb-fix-resv_map-leak-in-error-path.patch, bugfix/all/mm-fix-vma_resv_map-NULL-pointer.patch]
 3.2-upstream-stable: released (3.2.20) [queue-3.2/hugetlb-fix-resv_map-leak-in-error-path.patch, queue-3.2/mm-fix-vma_resv_map-null-pointer.patch]

Modified: active/CVE-2012-2745
===================================================================
--- active/CVE-2012-2745	2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-2745	2012-10-01 08:30:16 UTC (rev 2757)
@@ -6,5 +6,5 @@
 upstream: released (3.4) [79549c6dfda0603dba9a70a53467ce62d9335c33]
 2.6.32-upstream-stable: needed
 sid: released (3.2.15-1)
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/cred-copy_process-should-clear-child-replacement_session_keyring.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/cred-copy_process-should-clear-child-replacement_session_keyring.patch]
 3.2-upstream-stable: released (3.2.15)

Modified: active/CVE-2012-3400
===================================================================
--- active/CVE-2012-3400	2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-3400	2012-10-01 08:30:16 UTC (rev 2757)
@@ -5,5 +5,5 @@
 upstream: released (3.5-rc5) [1df2ae31c724e57be9d7ac00d78db8a5dabdd050, adee11b2085bee90bd8f4f52123ffb07882d6256]
 2.6.32-upstream-stable: needed
 sid: released (3.2.23-1)
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/udf-Fortify-loading-of-sparing-table.patch, bugfix/all/udf-Avoid-run-away-loop-when-partition-table-length-is-corrupted.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/udf-Fortify-loading-of-sparing-table.patch, bugfix/all/udf-Avoid-run-away-loop-when-partition-table-length-is-corrupted.patch]
 3.2-upstream-stable: released (3.2.23)

Modified: active/CVE-2012-3412
===================================================================
--- active/CVE-2012-3412	2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-3412	2012-10-01 08:30:16 UTC (rev 2757)
@@ -14,5 +14,5 @@
 upstream: released (3.6-rc2) [30b678d844af3305cda5953467005cebb5d7b687, 7e6d06f0de3f74ca929441add094518ae332257c, 7e6d06f0de3f74ca929441add094518ae332257c]
 2.6.32-upstream-stable:
 sid: released (3.2.29-1) [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
-2.6.32-squeeze-security: pending [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
+2.6.32-squeeze-security: released [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
 3.2-upstream-stable: pending [net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, tcp-apply-device-tso-segment-limit-earlier.patch]

Modified: active/CVE-2012-3430
===================================================================
--- active/CVE-2012-3430	2012-09-22 19:44:23 UTC (rev 2756)
+++ active/CVE-2012-3430	2012-10-01 08:30:16 UTC (rev 2757)
@@ -5,5 +5,5 @@
 upstream: released (3.6-rc1) [06b6a1cf6e776426766298d055bb3991957d90a7]
 2.6.32-upstream-stable: needed
 sid: released (3.2.29-1) [bugfix/all/rds-set-correct-msg_namelen.patch]
-2.6.32-squeeze-security: pending (2.6.32-46) [bugfix/all/rds-set-correct-msg_namelen.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/rds-set-correct-msg_namelen.patch]
 3.2-upstream-stable: needed




More information about the kernel-sec-discuss mailing list