[kernel-sec-discuss] r2658 - active

Dann Frazier dannf at alioth.debian.org
Thu Mar 29 16:12:52 UTC 2012


Author: dannf
Date: 2012-03-29 16:12:49 +0000 (Thu, 29 Mar 2012)
New Revision: 2658

Modified:
   active/CVE-2009-4307
   active/CVE-2011-1833
   active/CVE-2011-4347
   active/CVE-2012-0045
   active/CVE-2012-1090
   active/CVE-2012-1097
Log:
2.6.32-41squeeze1 is released

Modified: active/CVE-2009-4307
===================================================================
--- active/CVE-2009-4307	2012-03-27 00:32:41 UTC (rev 2657)
+++ active/CVE-2009-4307	2012-03-29 16:12:49 UTC (rev 2658)
@@ -11,4 +11,4 @@
 2.6.18-etch-security: N/A "introduced in 2.6.27 commit 772cb7c8"
 2.6.24-etch-security: N/A "introduced in 2.6.27 commit 772cb7c8"
 2.6.26-lenny-security: N/A "introduced in 2.6.27 commit 772cb7c8"
-2.6.32-squeeze-security: pending (2.6.32-41squeeze1) [bugfix/all/ext4-fix-undefined-behavior-in-ext4_fill_flex_info.patch] "fix in 2.6.32-2 was incomplete"
+2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/ext4-fix-undefined-behavior-in-ext4_fill_flex_info.patch] "fix in 2.6.32-2 was incomplete"

Modified: active/CVE-2011-1833
===================================================================
--- active/CVE-2011-1833	2012-03-27 00:32:41 UTC (rev 2657)
+++ active/CVE-2011-1833	2012-03-29 16:12:49 UTC (rev 2658)
@@ -5,4 +5,4 @@
 upstream: released (3.1-rc2) [764355487ea220fdc2faf128d577d7f679b91f97]
 2.6.32-upstream-stable: released (2.6.32.58) [98886b542b96243a07623139075be7193eca2ea2]
 sid: released (3.1.1-1)
-2.6.32-squeeze-security: pending (2.6.32-41squeeze1) [bugfix/all/add-mount-option-to-check-uid-of-device-being-mounted-expect-uid-cve-2011-1833.patch]
+2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/add-mount-option-to-check-uid-of-device-being-mounted-expect-uid-cve-2011-1833.patch]

Modified: active/CVE-2011-4347
===================================================================
--- active/CVE-2011-4347	2012-03-27 00:32:41 UTC (rev 2657)
+++ active/CVE-2011-4347	2012-03-29 16:12:49 UTC (rev 2658)
@@ -12,4 +12,4 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.1-1)
 2.6.26-lenny-security: N/A "code not present"
-2.6.32-squeeze-security: pending (2.6.32-41squeeze1) [bugfix/all/KVM-Remove-ability-to-assign-a-device-without-iommu-support.patch, bugfix/all/KVM-Device-assignment-permission-checks.patch
+2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/KVM-Remove-ability-to-assign-a-device-without-iommu-support.patch, bugfix/all/KVM-Device-assignment-permission-checks.patch

Modified: active/CVE-2012-0045
===================================================================
--- active/CVE-2012-0045	2012-03-27 00:32:41 UTC (rev 2657)
+++ active/CVE-2012-0045	2012-03-29 16:12:49 UTC (rev 2658)
@@ -9,4 +9,4 @@
 2.6.32-upstream-stable: needed
 sid: released (3.2.2-1) [bugfix/x86/KVM-x86-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-x86-fix-missing-checks-in-syscall-emulation.patch]
 2.6.26-lenny-security: N/A "Introduced in 2.6.32"
-2.6.32-squeeze-security: pending (2.6.32-41squeeze1) [bugfix/x86/KVM-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-fix-missing-checks-in-syscall-emulation.patch]
+2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/x86/KVM-extend-struct-x86_emulate_ops-with-get_cpuid.patch, bugfix/x86/KVM-fix-missing-checks-in-syscall-emulation.patch]

Modified: active/CVE-2012-1090
===================================================================
--- active/CVE-2012-1090	2012-03-27 00:32:41 UTC (rev 2657)
+++ active/CVE-2012-1090	2012-03-29 16:12:49 UTC (rev 2658)
@@ -7,4 +7,4 @@
 upstream: released (3.3-rc7) [5bccda0ebc7c0331b81ac47d39e4b920b198b2cd]
 2.6.32-upstream-stable: needed
 sid: released (3.2.10-1)
-2.6.32-squeeze-security: pending (2.6.32-41squeeze1) [bugfix/all/cifs-fix-dentry-refcount-leak-when-opening-a-FIFO-on.patch]
+2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/cifs-fix-dentry-refcount-leak-when-opening-a-FIFO-on.patch]

Modified: active/CVE-2012-1097
===================================================================
--- active/CVE-2012-1097	2012-03-27 00:32:41 UTC (rev 2657)
+++ active/CVE-2012-1097	2012-03-29 16:12:49 UTC (rev 2658)
@@ -7,4 +7,4 @@
 upstream: released (3.3-rc6) [c8e252586f8d5de906385d8cf6385fee289a825e, 5189fa19a4b2b4c3bec37c3a019d446148827717]
 2.6.32-upstream-stable: pending (2.6.32.59-rc1)
 sid: released (3.2.10-1)
-2.6.32-squeeze-security: pending (2.6.32-41squeeze1) [bugfix/all/regset-Prevent-null-pointer-reference-on-readonly-re.patch]
+2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/regset-Prevent-null-pointer-reference-on-readonly-re.patch]




More information about the kernel-sec-discuss mailing list