[kernel-sec-discuss] r2679 - active

Dann Frazier dannf at alioth.debian.org
Fri May 4 06:34:03 UTC 2012


Author: dannf
Date: 2012-05-04 06:34:01 +0000 (Fri, 04 May 2012)
New Revision: 2679

Modified:
   active/CVE-2011-3347
   active/CVE-2011-4086
   active/CVE-2011-4915
   active/CVE-2011-4917
   active/CVE-2012-0879
   active/CVE-2012-1179
   active/CVE-2012-1601
   active/CVE-2012-2119
   active/CVE-2012-2121
   active/CVE-2012-2123
   active/CVE-2012-2133
Log:
squeeze updates

Modified: active/CVE-2011-3347
===================================================================
--- active/CVE-2011-3347	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2011-3347	2012-05-04 06:34:01 UTC (rev 2679)
@@ -7,4 +7,4 @@
 upstream: released (3.2) [ecd0bf0f7b280bac3ac7419ed3aac84cd92878e9, 4c5102f94c175d81790a3a288e85efd4a8a1649a, c0e64ef4899df4cedc872871e54e2c069d29e519, 343e43c02850a3abcd22bd144e5bdbc92fdd273c]
 2.6.32-upstream-stable:
 sid: released (3.2-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"

Modified: active/CVE-2011-4086
===================================================================
--- active/CVE-2011-4086	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2011-4086	2012-05-04 06:34:01 UTC (rev 2679)
@@ -5,4 +5,4 @@
 upstream: released (3.2) [15291164b22a357cb211b618adfef4fa82fc0de3]
 2.6.32-upstream-stable: needed
 sid: released (3.2-1)
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_buffer.patch]

Modified: active/CVE-2011-4915
===================================================================
--- active/CVE-2011-4915	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2011-4915	2012-05-04 06:34:01 UTC (rev 2679)
@@ -7,4 +7,4 @@
 upstream:
 2.6.32-upstream-stable:
 sid:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "patch not accepted upstream"
\ No newline at end of file

Modified: active/CVE-2011-4917
===================================================================
--- active/CVE-2011-4917	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2011-4917	2012-05-04 06:34:01 UTC (rev 2679)
@@ -7,4 +7,4 @@
 upstream:
 2.6.32-upstream-stable:
 sid:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "patch not accepted upstream"

Modified: active/CVE-2012-0879
===================================================================
--- active/CVE-2012-0879	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-0879	2012-05-04 06:34:01 UTC (rev 2679)
@@ -7,5 +7,5 @@
 upstream: released (2.6.33) [61cc74fbb87af6aa551a06a370590c9bc07e29d9, b69f2292063d2caf37ca9aec7d63ded203701bf3]
 2.6.32-upstream-stable: needed
 sid: released (2.6.33-1)
-2.6.32-squeeze-security: pending (2.6.32-41squeeze3) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch]
+2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch]
 

Modified: active/CVE-2012-1179
===================================================================
--- active/CVE-2012-1179	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-1179	2012-05-04 06:34:01 UTC (rev 2679)
@@ -2,7 +2,7 @@
 References:
 Notes:
 Bugs:
-upstream: needed [1a5a9906d4e8d1976b701f889d8f35d54b928f25]
+upstream: released (3.4-rc1) [1a5a9906d4e8d1976b701f889d8f35d54b928f25]
 2.6.32-upstream-stable: needed
 sid: released (3.2.14-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"

Modified: active/CVE-2012-1601
===================================================================
--- active/CVE-2012-1601	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-1601	2012-05-04 06:34:01 UTC (rev 2679)
@@ -7,4 +7,4 @@
 upstream: released (3.4-rc1) [3e515705a1f46beb1c942bb8043c16f8ac7b1e9e]
 2.6.32-upstream-stable:
 sid: needed
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch]

Modified: active/CVE-2012-2119
===================================================================
--- active/CVE-2012-2119	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-2119	2012-05-04 06:34:01 UTC (rev 2679)
@@ -6,4 +6,4 @@
 upstream:
 2.6.32-upstream-stable:
 sid:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "not upstream yet"

Modified: active/CVE-2012-2121
===================================================================
--- active/CVE-2012-2121	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-2121	2012-05-04 06:34:01 UTC (rev 2679)
@@ -5,4 +5,4 @@
 upstream: released (3.4-rc4) [32f6daad4651a748a58a3ab6da0611862175722f, 21a1416a1c945c5aeaeaf791b63c64926018eb77]
 2.6.32-upstream-stable:
 sid:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"

Modified: active/CVE-2012-2123
===================================================================
--- active/CVE-2012-2123	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-2123	2012-05-04 06:34:01 UTC (rev 2679)
@@ -5,4 +5,4 @@
 upstream: released (3.4-rc4) [d52fc5dde171f030170a6cb78034d166b13c9445, 51b79bee627d526199b2f6a6bef8ee0c0739b6d1]
 2.6.32-upstream-stable:
 sid:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch]

Modified: active/CVE-2012-2133
===================================================================
--- active/CVE-2012-2133	2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-2133	2012-05-04 06:34:01 UTC (rev 2679)
@@ -6,4 +6,4 @@
 upstream: released (3.4-rc1) [90481622d75715bfcb68501280a917dbfe516029]
 2.6.32-upstream-stable: needed
 sid: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]




More information about the kernel-sec-discuss mailing list