[kernel-sec-discuss] r2802 - active

Dann Frazier dannf at alioth.debian.org
Thu Feb 14 05:51:55 UTC 2013


Author: dannf
Date: 2013-02-14 05:51:34 +0000 (Thu, 14 Feb 2013)
New Revision: 2802

Modified:
   active/CVE-2010-4805
   active/CVE-2011-2695
   active/CVE-2012-3552
   active/CVE-2012-4398
   active/CVE-2012-4444
   active/CVE-2012-4530
   active/CVE-2012-4565
   active/CVE-2013-0268
Log:
rebasing squeeze-security branch on 2.6.32-47 instead of 2.6.32-46 to allow for more testing

Modified: active/CVE-2010-4805
===================================================================
--- active/CVE-2010-4805	2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2010-4805	2013-02-14 05:51:34 UTC (rev 2802)
@@ -8,6 +8,6 @@
 upstream: released (2.6.35)
 2.6.32-upstream-stable: needed
 sid: released (2.6.35-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/net-sk_add_backlog-take-remem_alloc-into-account.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/net-sk_add_backlog-take-remem_alloc-into-account.patch]
 3.2-upstream-stable: N/A
 

Modified: active/CVE-2011-2695
===================================================================
--- active/CVE-2011-2695	2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2011-2695	2013-02-14 05:51:34 UTC (rev 2802)
@@ -6,5 +6,5 @@
 upstream: released (3.0) [f17722f917b2f21497deb6edc62fb1683daa08e6]
 2.6.32-upstream-stable: needed
 sid: released (3.0.0-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/ext4-Fix-max-file-size-and-logical-block-counting-of-extent-format-file.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/ext4-Fix-max-file-size-and-logical-block-counting-of-extent-format-file.patch]
 3.2-upstream-stable: N/A

Modified: active/CVE-2012-3552
===================================================================
--- active/CVE-2012-3552	2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2012-3552	2013-02-14 05:51:34 UTC (rev 2802)
@@ -5,5 +5,5 @@
 upstream: released (3.0) [f6d8bd051c391c1c0458a30b2a7abcd939329259]
 2.6.32-upstream-stable: 
 sid: released (3.0-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/inet-add-RCU-protection-to-inet-opt.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/inet-add-RCU-protection-to-inet-opt.patch]
 3.2-upstream-stable: N/A

Modified: active/CVE-2012-4398
===================================================================
--- active/CVE-2012-4398	2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2012-4398	2013-02-14 05:51:34 UTC (rev 2802)
@@ -6,5 +6,5 @@
 upstream: released (3.4) [b3449922, d0bd587a, 5b9bd473, 3e63a93b, 1cc684ab]
 2.6.32-upstream-stable: 
 sid: released (3.2.35-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/usermodehelper-introduce-umh_complete.patch, bugfix/all/usermodehelper-implement-UMH_KILLABLE.patch, bugfix/all/usermodehelper-____call_usermodehelper-doesnt-need-do_exit.patch, bugfix/all/kmod-introduce-call_modprobe-helper.patch, bugfix/all/kmod-make-__request_module-killable.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/usermodehelper-introduce-umh_complete.patch, bugfix/all/usermodehelper-implement-UMH_KILLABLE.patch, bugfix/all/usermodehelper-____call_usermodehelper-doesnt-need-do_exit.patch, bugfix/all/kmod-introduce-call_modprobe-helper.patch, bugfix/all/kmod-make-__request_module-killable.patch]
 3.2-upstream-stable: needed

Modified: active/CVE-2012-4444
===================================================================
--- active/CVE-2012-4444	2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2012-4444	2013-02-14 05:51:34 UTC (rev 2802)
@@ -5,5 +5,5 @@
 upstream: released (2.6.36) [70789d7052239992824628db8133de08dc78e593]
 2.6.32-upstream-stable: needed
 sid: released (2.6.36-1~experimental.1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/ipv6-discard-overlapping-fragment.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/ipv6-discard-overlapping-fragment.patch]
 3.2-upstream-stable: N/A

Modified: active/CVE-2012-4530
===================================================================
--- active/CVE-2012-4530	2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2012-4530	2013-02-14 05:51:34 UTC (rev 2802)
@@ -8,5 +8,5 @@
 upstream: released (v3.8-rc1) [d740269867021faf4ce38a449353d2b986c34a67, b66c5984017533316fd1951770302649baf1aa33]
 2.6.32-upstream-stable: needed
 sid: released (3.2.35-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/exec-do-not-leave-bprm-interp-on-stack.patch, bugfix/all/exec-use-ELOOP-for-max-recursion-depth.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/exec-do-not-leave-bprm-interp-on-stack.patch, bugfix/all/exec-use-ELOOP-for-max-recursion-depth.patch]
 3.2-upstream-stable: released (3.2.36)

Modified: active/CVE-2012-4565
===================================================================
--- active/CVE-2012-4565	2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2012-4565	2013-02-14 05:51:34 UTC (rev 2802)
@@ -6,5 +6,5 @@
 upstream: released (3.7-rc4) [8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664]
 2.6.32-upstream-stable: needed
 sid: released (3.2.35-1)
-2.6.32-squeeze-security: pending (2.6.32-47squeeze1) [bugfix/all/net-fix-divide-by-zero-in-tcp-algorithm-illinois.patch]
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/all/net-fix-divide-by-zero-in-tcp-algorithm-illinois.patch]
 3.2-upstream-stable: released (3.2.34) [df769f065d7bebf0ddc5f61605dbb1d8ea5ee2d8]

Modified: active/CVE-2013-0268
===================================================================
--- active/CVE-2013-0268	2013-02-08 15:37:01 UTC (rev 2801)
+++ active/CVE-2013-0268	2013-02-14 05:51:34 UTC (rev 2802)
@@ -5,5 +5,5 @@
 upstream: released (3.8-rc2) [c903f0456bc69176912dee6dd25c6a66ee1aed00]
 2.6.32-upstream-stable:
 sid: needed
-2.6.32-squeeze-security:
+2.6.32-squeeze-security: pending (2.6.32-46squeeze1) [bugfix/x86/msr-add-capabilities-check.patch]
 3.2-upstream-stable: released (3.2.38)




More information about the kernel-sec-discuss mailing list