[kernel-sec-discuss] r2802 - active
Dann Frazier
dannf at alioth.debian.org
Thu Feb 14 05:51:55 UTC 2013
Author: dannf
Date: 2013-02-14 05:51:34 +0000 (Thu, 14 Feb 2013)
New Revision: 2802
Modified:
active/CVE-2010-4805
active/CVE-2011-2695
active/CVE-2012-3552
active/CVE-2012-4398
active/CVE-2012-4444
active/CVE-2012-4530
active/CVE-2012-4565
active/CVE-2013-0268
Log:
rebasing squeeze-security branch on 2.6.32-47 instead of 2.6.32-46 to allow for more testing
Modified: active/CVE-2010-4805
===================================================================
--- active/CVE-2010-4805 2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2010-4805 2013-02-14 05:51:34 UTC (rev 2802)
@@ -8,6 +8,6 @@
upstream: released (2.6.35)
2.6.32-upstream-stable: needed
sid: released (2.6.35-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/net-sk_add_backlog-take-remem_alloc-into-account.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/net-sk_add_backlog-take-remem_alloc-into-account.patch]
3.2-upstream-stable: N/A
Modified: active/CVE-2011-2695
===================================================================
--- active/CVE-2011-2695 2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2011-2695 2013-02-14 05:51:34 UTC (rev 2802)
@@ -6,5 +6,5 @@
upstream: released (3.0) [f17722f917b2f21497deb6edc62fb1683daa08e6]
2.6.32-upstream-stable: needed
sid: released (3.0.0-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/ext4-Fix-max-file-size-and-logical-block-counting-of-extent-format-file.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/ext4-Fix-max-file-size-and-logical-block-counting-of-extent-format-file.patch]
3.2-upstream-stable: N/A
Modified: active/CVE-2012-3552
===================================================================
--- active/CVE-2012-3552 2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2012-3552 2013-02-14 05:51:34 UTC (rev 2802)
@@ -5,5 +5,5 @@
upstream: released (3.0) [f6d8bd051c391c1c0458a30b2a7abcd939329259]
2.6.32-upstream-stable:
sid: released (3.0-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/inet-add-RCU-protection-to-inet-opt.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/inet-add-RCU-protection-to-inet-opt.patch]
3.2-upstream-stable: N/A
Modified: active/CVE-2012-4398
===================================================================
--- active/CVE-2012-4398 2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2012-4398 2013-02-14 05:51:34 UTC (rev 2802)
@@ -6,5 +6,5 @@
upstream: released (3.4) [b3449922, d0bd587a, 5b9bd473, 3e63a93b, 1cc684ab]
2.6.32-upstream-stable:
sid: released (3.2.35-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/usermodehelper-introduce-umh_complete.patch, bugfix/all/usermodehelper-implement-UMH_KILLABLE.patch, bugfix/all/usermodehelper-____call_usermodehelper-doesnt-need-do_exit.patch, bugfix/all/kmod-introduce-call_modprobe-helper.patch, bugfix/all/kmod-make-__request_module-killable.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/usermodehelper-introduce-umh_complete.patch, bugfix/all/usermodehelper-implement-UMH_KILLABLE.patch, bugfix/all/usermodehelper-____call_usermodehelper-doesnt-need-do_exit.patch, bugfix/all/kmod-introduce-call_modprobe-helper.patch, bugfix/all/kmod-make-__request_module-killable.patch]
3.2-upstream-stable: needed
Modified: active/CVE-2012-4444
===================================================================
--- active/CVE-2012-4444 2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2012-4444 2013-02-14 05:51:34 UTC (rev 2802)
@@ -5,5 +5,5 @@
upstream: released (2.6.36) [70789d7052239992824628db8133de08dc78e593]
2.6.32-upstream-stable: needed
sid: released (2.6.36-1~experimental.1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/ipv6-discard-overlapping-fragment.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/ipv6-discard-overlapping-fragment.patch]
3.2-upstream-stable: N/A
Modified: active/CVE-2012-4530
===================================================================
--- active/CVE-2012-4530 2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2012-4530 2013-02-14 05:51:34 UTC (rev 2802)
@@ -8,5 +8,5 @@
upstream: released (v3.8-rc1) [d740269867021faf4ce38a449353d2b986c34a67, b66c5984017533316fd1951770302649baf1aa33]
2.6.32-upstream-stable: needed
sid: released (3.2.35-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/exec-do-not-leave-bprm-interp-on-stack.patch, bugfix/all/exec-use-ELOOP-for-max-recursion-depth.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/exec-do-not-leave-bprm-interp-on-stack.patch, bugfix/all/exec-use-ELOOP-for-max-recursion-depth.patch]
3.2-upstream-stable: released (3.2.36)
Modified: active/CVE-2012-4565
===================================================================
--- active/CVE-2012-4565 2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2012-4565 2013-02-14 05:51:34 UTC (rev 2802)
@@ -6,5 +6,5 @@
upstream: released (3.7-rc4) [8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664]
2.6.32-upstream-stable: needed
sid: released (3.2.35-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/net-fix-divide-by-zero-in-tcp-algorithm-illinois.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/net-fix-divide-by-zero-in-tcp-algorithm-illinois.patch]
3.2-upstream-stable: released (3.2.34) [df769f065d7bebf0ddc5f61605dbb1d8ea5ee2d8]
Modified: active/CVE-2013-0268
===================================================================
--- active/CVE-2013-0268 2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2013-0268 2013-02-14 05:51:34 UTC (rev 2802)
@@ -5,5 +5,5 @@
upstream: released (3.8-rc2) [c903f0456bc69176912dee6dd25c6a66ee1aed00]
2.6.32-upstream-stable:
sid: needed
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/x86/msr-add-capabilities-check.patch]
3.2-upstream-stable: released (3.2.38)
More information about the kernel-sec-discuss
mailing list