[kernel-sec-discuss] r2177 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Sun Jan 30 11:26:52 UTC 2011


Author: jmm
Date: 2011-01-30 11:26:46 +0000 (Sun, 30 Jan 2011)
New Revision: 2177

Modified:
   active/CVE-2010-0435
   active/CVE-2010-3699
   active/CVE-2010-4158
   active/CVE-2010-4162
   active/CVE-2010-4163
   active/CVE-2010-4242
   active/CVE-2010-4243
   active/CVE-2010-4248
   active/CVE-2010-4249
   active/CVE-2010-4258
   active/CVE-2010-4342
   active/CVE-2010-4346
   active/CVE-2010-4526
   active/CVE-2010-4527
   active/CVE-2010-4529
   active/CVE-2010-4565
   active/CVE-2010-4649
   active/CVE-2010-4656
   active/CVE-2010-4668
   active/CVE-2011-0521
Log:
record DSA


Modified: active/CVE-2010-0435
===================================================================
--- active/CVE-2010-0435	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-0435	2011-01-30 11:26:46 UTC (rev 2177)
@@ -11,5 +11,5 @@
 upstream: released (2.6.34)
 2.6.32-upstream-stable: released (2.6.32.27)
 linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/x86/kvm-vmx-fix-vmx-null-pointer-dereference-on-debug-register-access.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/x86/kvm-vmx-fix-vmx-null-pointer-dereference-on-debug-register-access.patch]
 2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]

Modified: active/CVE-2010-3699
===================================================================
--- active/CVE-2010-3699	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-3699	2011-01-30 11:26:46 UTC (rev 2177)
@@ -7,5 +7,5 @@
 upstream: N/A "This affects the Xen feature patch set, not in upstream proper"
 2.6.32-upstream-stable: N/A "This affects the Xen feature patch set, not in upstream proper"
 linux-2.6: pending (2.6.32-31)
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [features/all/xen/CVE-2010-3699.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [features/all/xen/CVE-2010-3699.patch]
 2.6.32-squeeze-security: pending (2.6.32-31)

Modified: active/CVE-2010-4158
===================================================================
--- active/CVE-2010-4158	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4158	2011-01-30 11:26:46 UTC (rev 2177)
@@ -10,5 +10,5 @@
 upstream: released (2.6.37-rc2) [57fe93b374a6b8711995c2d466c502af9f3a08bb]
 2.6.32-upstream-stable: needed
 linux-2.6: released (2.6.32-29) [bugfix/all/filter-make-sure-filters-dont-read-uninitialized-memory.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/filter-make-sure-filters-dont-read-uninitialized-memory.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/filter-make-sure-filters-dont-read-uninitialized-memory.patch]
 2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/filter-make-sure-filters-dont-read-uninitialized-memory.patch]

Modified: active/CVE-2010-4162
===================================================================
--- active/CVE-2010-4162	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4162	2011-01-30 11:26:46 UTC (rev 2177)
@@ -7,5 +7,5 @@
 upstream: released (2.6.37) [cb4644cac4a2797afc847e6c92736664d4b0ea34]
 2.6.32-upstream-stable: released (2.6.32.27)
 linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/bio-take-care-not-overflow-page-count-when-mapping-copying-user-data.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/bio-take-care-not-overflow-page-count-when-mapping-copying-user-data.patch]
 2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]

Modified: active/CVE-2010-4163
===================================================================
--- active/CVE-2010-4163	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4163	2011-01-30 11:26:46 UTC (rev 2177)
@@ -8,5 +8,5 @@
 upstream: released (2.6.37) [9284bcf4e335e5f18a8bc7b26461c33ab60d0689, 5478755616ae2ef1ce144dded589b62b2a50d575]
 2.6.32-upstream-stable: released (2.6.32.27)
 linux-2.6: released (2.6.32-29) [debian/patches/bugfix/all/stable/2.6.32.27.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/block-check-for-proper-length-of-iov-entries-in-blk_rq_map_user_iov.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/block-check-for-proper-length-of-iov-entries-in-blk_rq_map_user_iov.patch]
 2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]

Modified: active/CVE-2010-4242
===================================================================
--- active/CVE-2010-4242	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4242	2011-01-30 11:26:46 UTC (rev 2177)
@@ -8,5 +8,5 @@
 upstream: released (2.6.37) [c19483cc5e56ac5e22dd19cf25ba210ab1537773]
 2.6.32-upstream-stable: released (2.6.36.26)
 linux-2.6: released (2.6.32-28) [bugfix/all/stable/2.6.32.26.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/bluetooth-fix-missing-NULL-check.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/bluetooth-fix-missing-NULL-check.patch]
 2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/stable/2.6.32.26.patch]

Modified: active/CVE-2010-4243
===================================================================
--- active/CVE-2010-4243	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4243	2011-01-30 11:26:46 UTC (rev 2177)
@@ -14,5 +14,5 @@
 upstream: released (2.6.37-rc5) [3c77f84]
 2.6.32-upstream-stable: needed "Not yet queueed for 2.6.32.y, but it is queued for 2.6.35.y and the same fix applies to both"
 linux-2.6: released (2.6.32-30) [bugfix/all/exec-make-argv-envp-memory-visible-to-oom-killer.patch, bugfix/all/exec-copy-and-paste-the-fixes-into-compat_do_execve-paths.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/exec-make-argv-envp-memory-visible-to-oom-killer.patch, bugfix/all/exec-copy-and-paste-the-fixes-into-compat_do_execve-paths.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/exec-make-argv-envp-memory-visible-to-oom-killer.patch, bugfix/all/exec-copy-and-paste-the-fixes-into-compat_do_execve-paths.patch]
 2.6.32-squeeze-security: released (2.6.32-30) [bugfix/all/exec-make-argv-envp-memory-visible-to-oom-killer.patch, bugfix/all/exec-copy-and-paste-the-fixes-into-compat_do_execve-paths.patch]

Modified: active/CVE-2010-4248
===================================================================
--- active/CVE-2010-4248	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4248	2011-01-30 11:26:46 UTC (rev 2177)
@@ -7,5 +7,5 @@
 upstream: released (2.6.37-rc2) [e0a70217107e6f9844628120412cb27bb4cea194]
 2.6.32-upstream-stable: pending (2.6.32.28)
 linux-2.6: released (2.6.32-29) [bugfix/all/posix-cpu-timers-workaround-to-suppress-the-problems-with-mt-exec.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/posix-cpu-timers-workaround-to-suppress-the-problems-with-mt-exec.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/posix-cpu-timers-workaround-to-suppress-the-problems-with-mt-exec.patch]
 2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/posix-cpu-timers-workaround-to-suppress-the-problems-with-mt-exec.patch]

Modified: active/CVE-2010-4249
===================================================================
--- active/CVE-2010-4249	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4249	2011-01-30 11:26:46 UTC (rev 2177)
@@ -31,5 +31,11 @@
 upstream:
 2.6.32-upstream-stable:
 linux-2.6: released (2.6.30-30) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch]
 2.6.32-squeeze-security: released (2.6.30-30) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch]
+
+
+
+
+
+

Modified: active/CVE-2010-4258
===================================================================
--- active/CVE-2010-4258	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4258	2011-01-30 11:26:46 UTC (rev 2177)
@@ -8,5 +8,5 @@
 upstream: released (2.6.37-rc4) [33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177]
 2.6.32-upstream-stable: released (2.6.32.27)
 linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/do_exit-make-sure-that-we-run-with-get_fs-USER_DS.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/do_exit-make-sure-that-we-run-with-get_fs-USER_DS.patch]
 2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]

Modified: active/CVE-2010-4342
===================================================================
--- active/CVE-2010-4342	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4342	2011-01-30 11:26:46 UTC (rev 2177)
@@ -8,5 +8,5 @@
 upstream: released (2.6.37) [4e085e76cbe558b79b54cbab772f61185879bc64]
 2.6.32-upstream-stable: needed
 linux-2.6: released (2.6.32-30)
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/econet-fix-crash-in-aun_incoming.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/econet-fix-crash-in-aun_incoming.patch]
 2.6.32-squeeze-security: released (2.6.32-30)

Modified: active/CVE-2010-4346
===================================================================
--- active/CVE-2010-4346	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4346	2011-01-30 11:26:46 UTC (rev 2177)
@@ -8,5 +8,5 @@
 upstream: released (2.6.37) [462e635e5b73ba9a4c03913b77138cd57ce4b050]
 2.6.32-upstream-stable: released (2.6.32.28)
 linux-2.6: released (2.6.32-30)
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/install_special_mapping-skips-security_file_mmap_check.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/install_special_mapping-skips-security_file_mmap_check.patch]
 2.6.32-squeeze-security: released (2.6.32-30)

Modified: active/CVE-2010-4526
===================================================================
--- active/CVE-2010-4526	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4526	2011-01-30 11:26:46 UTC (rev 2177)
@@ -6,5 +6,5 @@
 upstream: released (2.6.34) [50b5d6ad63821cea324a5a7a19854d4de1a0a819]
 2.6.32-upstream-stable: released (2.6.32.28)
 linux-2.6: released (2.6.32-30)
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/CVE-2010-4526]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/CVE-2010-4526]
 2.6.32-squeeze-security: released (2.6.32-30)

Modified: active/CVE-2010-4527
===================================================================
--- active/CVE-2010-4527	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4527	2011-01-30 11:26:46 UTC (rev 2177)
@@ -6,5 +6,5 @@
 upstream: released (2.6.37) [d81a12bc29ae4038770e05dce4ab7f26fd5880fb]
 2.6.32-upstream-stable: released (2.6.32.28)
 linux-2.6: released (2.6.32-30)
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/CVE-2010-4527.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/CVE-2010-4527.patch]
 2.6.32-squeeze-security: released (2.6.32-30)

Modified: active/CVE-2010-4529
===================================================================
--- active/CVE-2010-4529	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4529	2011-01-30 11:26:46 UTC (rev 2177)
@@ -7,5 +7,5 @@
 upstream: released (2.6.37) [fdac1e0697356ac212259f2147aa60c72e334861]
 2.6.32-upstream-stable: needed "davem has it queued for stable"
 linux-2.6: released (2.6.32-30) [bugfix/all/irda-prevent-integer-underflow-in-IRLMP_ENUMDEVICES.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/irda-prevent-integer-underflow-in-IRLMP_ENUMDEVICES.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/irda-prevent-integer-underflow-in-IRLMP_ENUMDEVICES.patch]
 2.6.32-squeeze-security: released (2.6.32-30) [bugfix/all/irda-prevent-integer-underflow-in-IRLMP_ENUMDEVICES.patch]

Modified: active/CVE-2010-4565
===================================================================
--- active/CVE-2010-4565	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4565	2011-01-30 11:26:46 UTC (rev 2177)
@@ -6,5 +6,5 @@
 upstream: released (2.6.37) [9f260e0efa4766e56d0ac14f1aeea6ee5eb8fe83]
 2.6.32-upstream-stable: needed "stable@ was CCed]
 linux-2.6: needed
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/can-use-inode-instead-of-kernel-address-for-proc-file.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/can-use-inode-instead-of-kernel-address-for-proc-file.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2010-4649
===================================================================
--- active/CVE-2010-4649	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4649	2011-01-30 11:26:46 UTC (rev 2177)
@@ -6,5 +6,5 @@
 upstream: released (2.6.37) [7182afea8d1afd432a17c18162cc3fd441d0da93]
 2.6.32-upstream-stable: released (2.6.32.28)
 linux-2.6: released (2.6.32-30)
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/ib-uverbs-handle-large-number-of-entries-in-poll-CQ.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/ib-uverbs-handle-large-number-of-entries-in-poll-CQ.patch]
 2.6.32-squeeze-security: released (2.6.32-30)

Modified: active/CVE-2010-4656
===================================================================
--- active/CVE-2010-4656	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4656	2011-01-30 11:26:46 UTC (rev 2177)
@@ -8,5 +8,5 @@
 upstream:
 2.6.32-upstream-stable:
 linux-2.6:
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/usb-iowarrior-dont-trust-report_size-for-buffer-size.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/usb-iowarrior-dont-trust-report_size-for-buffer-size.patch]
 2.6.32-squeeze-security:

Modified: active/CVE-2010-4668
===================================================================
--- active/CVE-2010-4668	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2010-4668	2011-01-30 11:26:46 UTC (rev 2177)
@@ -8,5 +8,5 @@
 upstream: released (2.6.37) [5478755616ae2ef1ce144dded589b62b2a50d575]
 2.6.32-upstream-stable: released (2.6.32.27)
 linux-2.6: released (2.6.32-29)
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/block-check-for-proper-length-of-iov-entries-earlier-in-blk_rq_map_user_iov.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/block-check-for-proper-length-of-iov-entries-earlier-in-blk_rq_map_user_iov.patch]
 2.6.32-squeeze-security: released (2.6.32.27)

Modified: active/CVE-2011-0521
===================================================================
--- active/CVE-2011-0521	2011-01-28 14:50:14 UTC (rev 2176)
+++ active/CVE-2011-0521	2011-01-30 11:26:46 UTC (rev 2177)
@@ -8,5 +8,5 @@
 upstream: released (2.6.38-rc2) [cb26a24ee9706473f31d34cc259f4dcf45cd0644]
 2.6.32-upstream-stable: needed "submitted for 2.6.32.x on 2011-01-28"
 linux-2.6: pending (2.6.32-31) [bugfix/all/av7110-check-for-negative-array-offset.patch]
-2.6.26-lenny-security: pending (2.6.26-26lenny2) [bugfix/all/av7110-check-for-negative-array-offset.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/av7110-check-for-negative-array-offset.patch]
 2.6.32-squeeze-security: pending (2.6.32-31) [bugfix/all/av7110-check-for-negative-array-offset.patch]




More information about the kernel-sec-discuss mailing list