[kernel-sec-discuss] r2705 - active
Dann Frazier
dannf at alioth.debian.org
Tue Jun 12 22:38:46 UTC 2012
Author: dannf
Date: 2012-06-12 22:38:45 +0000 (Tue, 12 Jun 2012)
New Revision: 2705
Modified:
active/00boilerplate
active/CVE-2011-1020
active/CVE-2011-1083
active/CVE-2011-1747
active/CVE-2012-0879
active/CVE-2012-1601
active/CVE-2012-2121
active/CVE-2012-2123
active/CVE-2012-2133
active/CVE-2012-2136
active/CVE-2012-2137
active/CVE-2012-2313
active/CVE-2012-2319
active/CVE-2012-2372
active/CVE-2012-2373
active/CVE-2012-2375
active/CVE-2012-2383
active/CVE-2012-2384
active/CVE-2012-2669
Log:
cleanup eof eols
Modified: active/00boilerplate
===================================================================
--- active/00boilerplate 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/00boilerplate 2012-06-12 22:38:45 UTC (rev 2705)
@@ -6,4 +6,4 @@
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security:
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable:
Modified: active/CVE-2011-1020
===================================================================
--- active/CVE-2011-1020 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2011-1020 2012-06-12 22:38:45 UTC (rev 2705)
@@ -11,4 +11,3 @@
2.6.26-lenny-security: released (2.6.26-26lenny4) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch]
2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch, bugfix/all/proc-syscall-stack-personality-races.patch]
3.2-upstream-stable: N/A
-
Modified: active/CVE-2011-1083
===================================================================
--- active/CVE-2011-1083 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2011-1083 2012-06-12 22:38:45 UTC (rev 2705)
@@ -10,4 +10,3 @@
sid: released (3.2.9-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.9) [203aa5260edca2ab1872ad8b08386d874f7132f3]
-
Modified: active/CVE-2011-1747
===================================================================
--- active/CVE-2011-1747 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2011-1747 2012-06-12 22:38:45 UTC (rev 2705)
@@ -17,4 +17,3 @@
2.6.26-lenny-security: needed "no upstream fix as of 2011.06.20"
2.6.32-squeeze-security: needed "no upstream fix as of 2011.06.20"
3.2-upstream-stable: needed "no upstream fix as of 2011.06.20"
-
Modified: active/CVE-2012-0879
===================================================================
--- active/CVE-2012-0879 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-0879 2012-06-12 22:38:45 UTC (rev 2705)
@@ -9,4 +9,3 @@
sid: released (2.6.33-1)
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch]
3.2-upstream-stable: N/A
-
Modified: active/CVE-2012-1601
===================================================================
--- active/CVE-2012-1601 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-1601 2012-06-12 22:38:45 UTC (rev 2705)
@@ -9,4 +9,3 @@
sid: pending (3.2.17-1) [bugfix/all/kvm-ensure-all-vcpus-are-consistent-with-in-kernel-irqchip.patch]
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch]
3.2-upstream-stable: released (3.2.19) [645b177cbfce6b695bdbe0b4c131de584821840d]
-
Modified: active/CVE-2012-2121
===================================================================
--- active/CVE-2012-2121 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2121 2012-06-12 22:38:45 UTC (rev 2705)
@@ -7,4 +7,3 @@
sid: pending (3.2.17-1) [bugfix/all/kvm-lock-slots_lock-around-device-assignment.patch]
2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
3.2-upstream-stable: released (3.2.19) [1e57aab4e6c549804298f07fac0b6fc77f10fab2, 50fcec93e8c917b4f6e1a3219207d351e6eae1b2]
-
Modified: active/CVE-2012-2123
===================================================================
--- active/CVE-2012-2123 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2123 2012-06-12 22:38:45 UTC (rev 2705)
@@ -7,4 +7,3 @@
sid: released (3.2.16-1)
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch]
3.2-upstream-stable: released (3.2.16) [f2c309c36d0a433c88534082cb2c3a817d6bd409, fd18a0805b2b68228c0493337000f63c2573cc0c]
-
Modified: active/CVE-2012-2133
===================================================================
--- active/CVE-2012-2133 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2133 2012-06-12 22:38:45 UTC (rev 2705)
@@ -8,4 +8,3 @@
sid: released (3.2.19-1) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
3.2-upstream-stable: needed
-
Modified: active/CVE-2012-2136
===================================================================
--- active/CVE-2012-2136 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2136 2012-06-12 22:38:45 UTC (rev 2705)
@@ -9,4 +9,3 @@
sid: released (3.2.20-1)
2.6.32-squeeze-security:
3.2-upstream-stable:
-
Modified: active/CVE-2012-2137
===================================================================
--- active/CVE-2012-2137 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2137 2012-06-12 22:38:45 UTC (rev 2705)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable:
sid: released (3.2.20-1)
2.6.32-squeeze-security:
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable:
Modified: active/CVE-2012-2313
===================================================================
--- active/CVE-2012-2313 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2313 2012-06-12 22:38:45 UTC (rev 2705)
@@ -11,4 +11,3 @@
sid: pending (3.2.19-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.19) [bdd06be083b51fa7bdf04d8c8b699870f29bae69]
-
Modified: active/CVE-2012-2319
===================================================================
--- active/CVE-2012-2319 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2319 2012-06-12 22:38:45 UTC (rev 2705)
@@ -7,4 +7,3 @@
sid: pending (3.2.17-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.17) [d4af6eb924ce29b9e46037134ca69ce085b5c36c]
-
Modified: active/CVE-2012-2372
===================================================================
--- active/CVE-2012-2372 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2372 2012-06-12 22:38:45 UTC (rev 2705)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security:
-3.2-upstream-stable:
\ No newline at end of file
+3.2-upstream-stable:
Modified: active/CVE-2012-2373
===================================================================
--- active/CVE-2012-2373 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2373 2012-06-12 22:38:45 UTC (rev 2705)
@@ -8,4 +8,3 @@
sid: released (3.2.19-1) [bugfix/x86/mm-pmd_read_atomic-fix-32bit-pae-pmd-walk-vs-pmd_populate-smp-race.patch]
2.6.32-squeeze-security:
3.2-upstream-stable: pending [queue-3.2/mm-pmd_read_atomic-fix-32bit-pae-pmd-walk-vs-pmd_populate-smp-race.patch]
-
Modified: active/CVE-2012-2375
===================================================================
--- active/CVE-2012-2375 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2375 2012-06-12 22:38:45 UTC (rev 2705)
@@ -8,4 +8,3 @@
sid: pending (3.2.19-1)
2.6.32-squeeze-security:
3.2-upstream-stable: releaed (3.2.19) [a94841724154dac38ce5239d1d88c00e758dc20d, b7d52ac86a9753520a696af25d333e3451eeae92, 84e017e3ff4113a32c827f2d7f96e1a9b1f7a677]
-
Modified: active/CVE-2012-2383
===================================================================
--- active/CVE-2012-2383 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2383 2012-06-12 22:38:45 UTC (rev 2705)
@@ -7,4 +7,3 @@
sid: released (3.2.17-1)
2.6.32-squeeze-security: N/A "Introduced in 2.6.39 with 8408c282"
3.2-upstream-stable: released (3.2.17) [a9206caacef21a1eeee7083d8fb188cfeb15fd52]
-
Modified: active/CVE-2012-2384
===================================================================
--- active/CVE-2012-2384 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2384 2012-06-12 22:38:45 UTC (rev 2705)
@@ -7,4 +7,3 @@
sid: released (3.2.17-1)
2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 432e58ed"
3.2-upstream-stable: released (3.2.17) [c9b310ee2b2a50ffaa6ea0ca9226c64a12ed0c54]
-
Modified: active/CVE-2012-2669
===================================================================
--- active/CVE-2012-2669 2012-06-12 22:37:28 UTC (rev 2704)
+++ active/CVE-2012-2669 2012-06-12 22:38:45 UTC (rev 2705)
@@ -7,4 +7,4 @@
2.6.32-upstream-stable: N/A "userspace daemon not yet present"
sid: N/A "We don't build the hyperv tools yet"
2.6.32-squeeze-security: N/A "userspace daemon not yet present"
-3.2-upstream-stable: needed
\ No newline at end of file
+3.2-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list