[kernel-sec-discuss] r2630 - active

Ben Hutchings benh at alioth.debian.org
Mon Mar 12 03:09:00 UTC 2012


Author: benh
Date: 2012-03-12 03:08:59 +0000 (Mon, 12 Mar 2012)
New Revision: 2630

Modified:
   active/CVE-2011-2203
   active/CVE-2011-4077
   active/CVE-2011-4127
   active/CVE-2011-4132
   active/CVE-2011-4330
   active/CVE-2011-4611
   active/CVE-2011-4622
   active/CVE-2011-4914
   active/CVE-2012-0028
Log:
Note issues fixed in 2.6.26-28

Modified: active/CVE-2011-2203
===================================================================
--- active/CVE-2011-2203	2012-03-09 09:24:30 UTC (rev 2629)
+++ active/CVE-2011-2203	2012-03-12 03:08:59 UTC (rev 2630)
@@ -8,5 +8,5 @@
 upstream: released (3.2-rc1) [434a964daa14b9db083ce20404a4a2add54d037a]
 2.6.32-upstream-stable: released (2.6.32.51)
 sid: released (3.1.1-1)
-2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/hfs-fix-hfs_find_init-ext_tree-NULL-ptr-oops.patch]
+2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/hfs-fix-hfs_find_init-ext_tree-NULL-ptr-oops.patch]
 2.6.32-squeeze-security: released (2.6.32-40)

Modified: active/CVE-2011-4077
===================================================================
--- active/CVE-2011-4077	2012-03-09 09:24:30 UTC (rev 2629)
+++ active/CVE-2011-4077	2012-03-12 03:08:59 UTC (rev 2630)
@@ -9,5 +9,5 @@
 upstream: released (3.2-rc2) [b52a360b2aa1c59ba9970fb0f52bbb093fcc7a24]
 2.6.32-upstream-stable: needed
 sid: released (3.0.0-6) [bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink.patch, bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink-2.patch]
-2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
+2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
 2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]

Modified: active/CVE-2011-4127
===================================================================
--- active/CVE-2011-4127	2012-03-09 09:24:30 UTC (rev 2629)
+++ active/CVE-2011-4127	2012-03-12 03:08:59 UTC (rev 2630)
@@ -8,4 +8,4 @@
 2.6.32-upstream-stable: needed
 sid: released (3.1.8-1)
 2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/add-scsi_cmd_blk_ioctl-wrapper.patch, bugfix/all/limit-ioctls-forwarded-to-non-scsi-devices.patch, bugfix/all/treat-lvs-on-one-pv-like-a-partition.patch]
-
+2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/block-add-and-use-scsi_blk_cmd_ioctl.patch, bugfix/all/block-fail-SCSI-passthrough-ioctls-on-partition-devices.patch, bugfix/all/dm-do-not-forward-ioctls-from-logical-volumes-to-the-underlying-device.patch]

Modified: active/CVE-2011-4132
===================================================================
--- active/CVE-2011-4132	2012-03-09 09:24:30 UTC (rev 2629)
+++ active/CVE-2011-4132	2012-03-12 03:08:59 UTC (rev 2630)
@@ -6,5 +6,5 @@
 upstream: released (3.2-rc2) [8762202dd0d6e46854f786bdb6fb3780a1625efe]
 2.6.32-upstream-stable: released (2.6.32.51)
 sid: released (3.1.6-1)
-2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/jbd,jb2-validate-sb-s_first-in-journal_get_superblock.patch]
+2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/jbd,jb2-validate-sb-s_first-in-journal_get_superblock.patch]
 2.6.32-squeeze-security: released (2.6.32-40)

Modified: active/CVE-2011-4330
===================================================================
--- active/CVE-2011-4330	2012-03-09 09:24:30 UTC (rev 2629)
+++ active/CVE-2011-4330	2012-03-12 03:08:59 UTC (rev 2630)
@@ -5,5 +5,5 @@
 upstream: released (3.2-rc3) [bc5b8a9003132ae44559edd63a1623]
 2.6.32-upstream-stable: released (2.6.32.49)
 sid: released (3.1.4-1)
-2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/hfs-add-sanity-check-for-file-name-length.patch]
+2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/hfs-add-sanity-check-for-file-name-length.patch]
 2.6.32-squeeze-security: released (2.6.32-40) [bugfix/all/stable/2.6.32.49.patch]

Modified: active/CVE-2011-4611
===================================================================
--- active/CVE-2011-4611	2012-03-09 09:24:30 UTC (rev 2629)
+++ active/CVE-2011-4611	2012-03-12 03:08:59 UTC (rev 2630)
@@ -8,5 +8,5 @@
 upstream: released (3.0) [0837e3242c73566fc1c0196b4ec61779c25ffc93, ad5d5292f16c6c1d7d3e257c4c7407594286b97e, d819437156fd99da61d4e1402b2dbfc5cc472265]
 2.6.32-upstream-stable: released (2.6.32.42) [3a579b0ce569d5738120d74bdcc8f76b740c97c4,24fb3f4cf3de9955eae325d421047c0f2dd6b48f]
 sid: released (3.0.0-1)
-2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/powerpc/oprofile-handle-events-that-raise-an-exception-without-overflowing.patch]
+2.6.26-lenny-security: ignored "end of life"
 2.6.32-squeeze-security: released (2.6.32-36) [bugfix/all/stable/2.6.32.34.patch, bugfix/all/stable/2.6.32.34.patch]

Modified: active/CVE-2011-4622
===================================================================
--- active/CVE-2011-4622	2012-03-09 09:24:30 UTC (rev 2629)
+++ active/CVE-2011-4622	2012-03-12 03:08:59 UTC (rev 2630)
@@ -6,5 +6,5 @@
 upstream: released (3.2) [0924ab2cfa98b1ece26c033d696651fd62896c69]
 2.6.32-upstream-stable: needed
 sid: released (3.1.8-1)
-2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]
+2.6.26-lenny-security: released (2.6.26-28) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]
 2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/x86/kvm-prevent-starting-pit-timers-in-the-absence-of-irqchip-support.patch]

Modified: active/CVE-2011-4914
===================================================================
--- active/CVE-2011-4914	2012-03-09 09:24:30 UTC (rev 2629)
+++ active/CVE-2011-4914	2012-03-12 03:08:59 UTC (rev 2630)
@@ -8,5 +8,5 @@
 upstream: released (2.6.39-rc1) [e0bccd315db0c2f919e7fcf9cb60db21d9986f52]
 2.6.32-upstream-stable: needed
 sid: released (2.6.39-1)
-2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]
+2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]
 2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/rose-add-length-checks-to-CALL_REQUEST-parsing.patch]

Modified: active/CVE-2012-0028
===================================================================
--- active/CVE-2012-0028	2012-03-09 09:24:30 UTC (rev 2629)
+++ active/CVE-2012-0028	2012-03-12 03:08:59 UTC (rev 2630)
@@ -6,5 +6,5 @@
 upstream: released (2.6.32) [8141c7f3e7aee618312fa1c15109e1219de784a7, fc6b177dee33365ccb29fe6d2092223cf8d679f9]
 2.6.32-upstream-stable: N/A "Fixed before initial release"
 sid: released (2.6.32-1)
-2.6.26-lenny-security: pending (2.6.26-27lenny1) [bugfix/all/move-exit_robust_list-into-mm_release.patch, bugfix/all/futex-nullify-robust-lists-after-cleanup.patch]
+2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/move-exit_robust_list-into-mm_release.patch, bugfix/all/futex-nullify-robust-lists-after-cleanup.patch]
 2.6.32-squeeze-security: N/A "Fixed before initial release"




More information about the kernel-sec-discuss mailing list