[kernel-sec-discuss] r2285 - active
Dann Frazier
dannf at alioth.debian.org
Tue May 3 05:57:28 UTC 2011
Author: dannf
Date: 2011-05-03 05:57:25 +0000 (Tue, 03 May 2011)
New Revision: 2285
Modified:
active/CVE-2011-1017
active/CVE-2011-1476
active/CVE-2011-1477
active/CVE-2011-1494
active/CVE-2011-1495
active/CVE-2011-1593
active/CVE-2011-1598
active/CVE-2011-1745
active/CVE-2011-1746
active/CVE-2011-1748
Log:
Various updates
Modified: active/CVE-2011-1017
===================================================================
--- active/CVE-2011-1017 2011-05-03 04:37:09 UTC (rev 2284)
+++ active/CVE-2011-1017 2011-05-03 05:57:25 UTC (rev 2285)
@@ -9,4 +9,4 @@
2.6.32-upstream-stable: needed
linux-2.6: needed
2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-34) [bugfix/all/partitions-ldm-fix-oops-caused-by-corrupted-partition-table.patch]
Modified: active/CVE-2011-1476
===================================================================
--- active/CVE-2011-1476 2011-05-03 04:37:09 UTC (rev 2284)
+++ active/CVE-2011-1476 2011-05-03 05:57:25 UTC (rev 2285)
@@ -9,4 +9,4 @@
2.6.32-upstream-stable: released (2.6.32.37)
linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-34) [bugfix/all/stable/2.6.32.37.patch]
Modified: active/CVE-2011-1477
===================================================================
--- active/CVE-2011-1477 2011-05-03 04:37:09 UTC (rev 2284)
+++ active/CVE-2011-1477 2011-05-03 05:57:25 UTC (rev 2285)
@@ -6,7 +6,7 @@
jmm> OSS disabled since Squeeze
Bugs:
upstream: released (2.6.39-rc1) [b769f49463711205d57286e64cf535ed4daf59e9]
-2.6.32-upstream-stable: released (2.6.32.37)
+2.6.32-upstream-stable: released (2.6.32.37) [ef79e147a62e11f6a657b076bc98192fba725645]
linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/stable/2.6.32.37.patch]
Modified: active/CVE-2011-1494
===================================================================
--- active/CVE-2011-1494 2011-05-03 04:37:09 UTC (rev 2284)
+++ active/CVE-2011-1494 2011-05-03 05:57:25 UTC (rev 2285)
@@ -7,8 +7,8 @@
jmm> no upstream fix as of 2011-04-18
Notes:
Bugs:
-upstream: needed
-2.6.32-upstream-stable: needed
+upstream: pending (2.6.39-rc6) [a1f74ae82d133ebb2aabb19d181944b4e83e9960]
+2.6.32-upstream-stable: needed "stable was cc'd"
linux-2.6: needed
2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-34) [bugfix/all/mpt2sas-prevent-heap-overflows-and-unchecked-reads.patch]
Modified: active/CVE-2011-1495
===================================================================
--- active/CVE-2011-1495 2011-05-03 04:37:09 UTC (rev 2284)
+++ active/CVE-2011-1495 2011-05-03 05:57:25 UTC (rev 2285)
@@ -7,8 +7,8 @@
jmm> no upstream fix as of 2011-04-18
Notes:
Bugs:
-upstream: needed
-2.6.32-upstream-stable: needed
+upstream: pending (2.6.39-rc6) [a1f74ae82d133ebb2aabb19d181944b4e83e9960]
+2.6.32-upstream-stable: needed "stable was cc'd"
linux-2.6: needed
2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-34) [bugfix/all/mpt2sas-prevent-heap-overflows-and-unchecked-reads.patch]
Modified: active/CVE-2011-1593
===================================================================
--- active/CVE-2011-1593 2011-05-03 04:37:09 UTC (rev 2284)
+++ active/CVE-2011-1593 2011-05-03 05:57:25 UTC (rev 2285)
@@ -6,7 +6,7 @@
Notes:
Bugs:
upstream: released (2.6.39-rc4) [c78193e9, d8bdc59f]
-2.6.32-upstream-stable:
-linux-2.6:
+2.6.32-upstream-stable: released (2.6.32.39) [67e022f3add1879292986e779b2aaf6ecb93fa58]
+linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.4.patch]
2.6.26-lenny-security:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-34) [bugfix/all/stable/2.6.32.39.patch]
Modified: active/CVE-2011-1598
===================================================================
--- active/CVE-2011-1598 2011-05-03 04:37:09 UTC (rev 2284)
+++ active/CVE-2011-1598 2011-05-03 05:57:25 UTC (rev 2285)
@@ -5,8 +5,8 @@
https://bugzilla.redhat.com/show_bug.cgi?id=698057
Notes:
Bugs:
-upstream: needed
+upstream: pending (2.6.39-rc6) [c6914a6f261aca0c9f715f883a353ae7ff51fe83]
2.6.32-upstream-stable: needed
linux-2.6: needed
2.6.26-lenny-security:
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-34) [bugfix/all/can-add-missing-socket-check-in-can+bcm-release.patch]
Modified: active/CVE-2011-1745
===================================================================
--- active/CVE-2011-1745 2011-05-03 04:37:09 UTC (rev 2284)
+++ active/CVE-2011-1745 2011-05-03 05:57:25 UTC (rev 2285)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable: needed
linux-2.6: needed
2.6.26-lenny-security:
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-34) [bugfix/all/agp-fix-arbitrary-kernel-memory-writes.patch]
Modified: active/CVE-2011-1746
===================================================================
--- active/CVE-2011-1746 2011-05-03 04:37:09 UTC (rev 2284)
+++ active/CVE-2011-1746 2011-05-03 05:57:25 UTC (rev 2285)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable: needed
linux-2.6: needed
2.6.26-lenny-security:
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-34) [bugfix/all/agp-fix-OOM-and-buffer-overflow.patch]
Modified: active/CVE-2011-1748
===================================================================
--- active/CVE-2011-1748 2011-05-03 04:37:09 UTC (rev 2284)
+++ active/CVE-2011-1748 2011-05-03 05:57:25 UTC (rev 2285)
@@ -4,8 +4,8 @@
http://permalink.gmane.org/gmane.linux.network/192974
Notes:
Bugs:
-upstream: needed
+upstream: pending (2.6.39-rc6) [10022a6c66e199d8f61d9044543f38785713cbbd]
2.6.32-upstream-stable: needed
linux-2.6: needed
2.6.26-lenny-security:
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-34) [bugfix/all/can-add-missing-socket-check-in-can+raw-release.patch]
More information about the kernel-sec-discuss
mailing list