[kernel-sec-discuss] r2679 - active
Dann Frazier
dannf at alioth.debian.org
Fri May 4 06:34:03 UTC 2012
Author: dannf
Date: 2012-05-04 06:34:01 +0000 (Fri, 04 May 2012)
New Revision: 2679
Modified:
active/CVE-2011-3347
active/CVE-2011-4086
active/CVE-2011-4915
active/CVE-2011-4917
active/CVE-2012-0879
active/CVE-2012-1179
active/CVE-2012-1601
active/CVE-2012-2119
active/CVE-2012-2121
active/CVE-2012-2123
active/CVE-2012-2133
Log:
squeeze updates
Modified: active/CVE-2011-3347
===================================================================
--- active/CVE-2011-3347 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2011-3347 2012-05-04 06:34:01 UTC (rev 2679)
@@ -7,4 +7,4 @@
upstream: released (3.2) [ecd0bf0f7b280bac3ac7419ed3aac84cd92878e9, 4c5102f94c175d81790a3a288e85efd4a8a1649a, c0e64ef4899df4cedc872871e54e2c069d29e519, 343e43c02850a3abcd22bd144e5bdbc92fdd273c]
2.6.32-upstream-stable:
sid: released (3.2-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
Modified: active/CVE-2011-4086
===================================================================
--- active/CVE-2011-4086 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2011-4086 2012-05-04 06:34:01 UTC (rev 2679)
@@ -5,4 +5,4 @@
upstream: released (3.2) [15291164b22a357cb211b618adfef4fa82fc0de3]
2.6.32-upstream-stable: needed
sid: released (3.2-1)
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/jbd2-clear-BH_Delay-BH_Unwritten-in-journal_unmap_buffer.patch]
Modified: active/CVE-2011-4915
===================================================================
--- active/CVE-2011-4915 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2011-4915 2012-05-04 06:34:01 UTC (rev 2679)
@@ -7,4 +7,4 @@
upstream:
2.6.32-upstream-stable:
sid:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "patch not accepted upstream"
\ No newline at end of file
Modified: active/CVE-2011-4917
===================================================================
--- active/CVE-2011-4917 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2011-4917 2012-05-04 06:34:01 UTC (rev 2679)
@@ -7,4 +7,4 @@
upstream:
2.6.32-upstream-stable:
sid:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "patch not accepted upstream"
Modified: active/CVE-2012-0879
===================================================================
--- active/CVE-2012-0879 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-0879 2012-05-04 06:34:01 UTC (rev 2679)
@@ -7,5 +7,5 @@
upstream: released (2.6.33) [61cc74fbb87af6aa551a06a370590c9bc07e29d9, b69f2292063d2caf37ca9aec7d63ded203701bf3]
2.6.32-upstream-stable: needed
sid: released (2.6.33-1)
-2.6.32-squeeze-security: pending (2.6.32-41squeeze3) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch]
+2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch]
Modified: active/CVE-2012-1179
===================================================================
--- active/CVE-2012-1179 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-1179 2012-05-04 06:34:01 UTC (rev 2679)
@@ -2,7 +2,7 @@
References:
Notes:
Bugs:
-upstream: needed [1a5a9906d4e8d1976b701f889d8f35d54b928f25]
+upstream: released (3.4-rc1) [1a5a9906d4e8d1976b701f889d8f35d54b928f25]
2.6.32-upstream-stable: needed
sid: released (3.2.14-1)
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
Modified: active/CVE-2012-1601
===================================================================
--- active/CVE-2012-1601 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-1601 2012-05-04 06:34:01 UTC (rev 2679)
@@ -7,4 +7,4 @@
upstream: released (3.4-rc1) [3e515705a1f46beb1c942bb8043c16f8ac7b1e9e]
2.6.32-upstream-stable:
sid: needed
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch]
Modified: active/CVE-2012-2119
===================================================================
--- active/CVE-2012-2119 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-2119 2012-05-04 06:34:01 UTC (rev 2679)
@@ -6,4 +6,4 @@
upstream:
2.6.32-upstream-stable:
sid:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "not upstream yet"
Modified: active/CVE-2012-2121
===================================================================
--- active/CVE-2012-2121 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-2121 2012-05-04 06:34:01 UTC (rev 2679)
@@ -5,4 +5,4 @@
upstream: released (3.4-rc4) [32f6daad4651a748a58a3ab6da0611862175722f, 21a1416a1c945c5aeaeaf791b63c64926018eb77]
2.6.32-upstream-stable:
sid:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
Modified: active/CVE-2012-2123
===================================================================
--- active/CVE-2012-2123 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-2123 2012-05-04 06:34:01 UTC (rev 2679)
@@ -5,4 +5,4 @@
upstream: released (3.4-rc4) [d52fc5dde171f030170a6cb78034d166b13c9445, 51b79bee627d526199b2f6a6bef8ee0c0739b6d1]
2.6.32-upstream-stable:
sid:
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch]
Modified: active/CVE-2012-2133
===================================================================
--- active/CVE-2012-2133 2012-05-01 05:54:11 UTC (rev 2678)
+++ active/CVE-2012-2133 2012-05-04 06:34:01 UTC (rev 2679)
@@ -6,4 +6,4 @@
upstream: released (3.4-rc1) [90481622d75715bfcb68501280a917dbfe516029]
2.6.32-upstream-stable: needed
sid: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: pending (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
More information about the kernel-sec-discuss
mailing list