summaryrefslogtreecommitdiffstats
path: root/active
diff options
context:
space:
mode:
authordann frazier <dannf@debian.org>2012-06-12 22:38:45 +0000
committerdann frazier <dannf@debian.org>2012-06-12 22:38:45 +0000
commit06a5f465a3f700b46e8c81361da1d0e770cb2d95 (patch)
treec2e46adfd6e8f2454a5e81f953b1709434b15d83 /active
parent943bfa8eecd0d0714da987451325b4342b168c4f (diff)
cleanup eof eols
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2705 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'active')
-rw-r--r--active/00boilerplate2
-rw-r--r--active/CVE-2011-10201
-rw-r--r--active/CVE-2011-10831
-rw-r--r--active/CVE-2011-17471
-rw-r--r--active/CVE-2012-08791
-rw-r--r--active/CVE-2012-16011
-rw-r--r--active/CVE-2012-21211
-rw-r--r--active/CVE-2012-21231
-rw-r--r--active/CVE-2012-21331
-rw-r--r--active/CVE-2012-21361
-rw-r--r--active/CVE-2012-21372
-rw-r--r--active/CVE-2012-23131
-rw-r--r--active/CVE-2012-23191
-rw-r--r--active/CVE-2012-23722
-rw-r--r--active/CVE-2012-23731
-rw-r--r--active/CVE-2012-23751
-rw-r--r--active/CVE-2012-23831
-rw-r--r--active/CVE-2012-23841
-rw-r--r--active/CVE-2012-26692
19 files changed, 4 insertions, 19 deletions
diff --git a/active/00boilerplate b/active/00boilerplate
index 39905696..2fcbe3d2 100644
--- a/active/00boilerplate
+++ b/active/00boilerplate
@@ -6,4 +6,4 @@ upstream:
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security:
-3.2-upstream-stable: \ No newline at end of file
+3.2-upstream-stable:
diff --git a/active/CVE-2011-1020 b/active/CVE-2011-1020
index 3297439f..ca924bd6 100644
--- a/active/CVE-2011-1020
+++ b/active/CVE-2011-1020
@@ -11,4 +11,3 @@ sid: released (2.6.39-1)
2.6.26-lenny-security: released (2.6.26-26lenny4) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch]
2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch, bugfix/all/proc-syscall-stack-personality-races.patch]
3.2-upstream-stable: N/A
-
diff --git a/active/CVE-2011-1083 b/active/CVE-2011-1083
index 020df0c1..8b5ba7be 100644
--- a/active/CVE-2011-1083
+++ b/active/CVE-2011-1083
@@ -10,4 +10,3 @@ upstream: released (3.3-rc1) [28d82dc1c4edbc352129f97f4ca22624d1fe61de]
sid: released (3.2.9-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.9) [203aa5260edca2ab1872ad8b08386d874f7132f3]
-
diff --git a/active/CVE-2011-1747 b/active/CVE-2011-1747
index 1020215f..de6ba606 100644
--- a/active/CVE-2011-1747
+++ b/active/CVE-2011-1747
@@ -17,4 +17,3 @@ sid: needed "no upstream fix as of 2011.06.20"
2.6.26-lenny-security: needed "no upstream fix as of 2011.06.20"
2.6.32-squeeze-security: needed "no upstream fix as of 2011.06.20"
3.2-upstream-stable: needed "no upstream fix as of 2011.06.20"
-
diff --git a/active/CVE-2012-0879 b/active/CVE-2012-0879
index 05404646..e23eac9a 100644
--- a/active/CVE-2012-0879
+++ b/active/CVE-2012-0879
@@ -9,4 +9,3 @@ upstream: released (2.6.33) [61cc74fbb87af6aa551a06a370590c9bc07e29d9, b69f22920
sid: released (2.6.33-1)
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch]
3.2-upstream-stable: N/A
-
diff --git a/active/CVE-2012-1601 b/active/CVE-2012-1601
index 9038df93..71f6287e 100644
--- a/active/CVE-2012-1601
+++ b/active/CVE-2012-1601
@@ -9,4 +9,3 @@ upstream: released (3.4-rc1) [3e515705a1f46beb1c942bb8043c16f8ac7b1e9e]
sid: pending (3.2.17-1) [bugfix/all/kvm-ensure-all-vcpus-are-consistent-with-in-kernel-irqchip.patch]
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch]
3.2-upstream-stable: released (3.2.19) [645b177cbfce6b695bdbe0b4c131de584821840d]
-
diff --git a/active/CVE-2012-2121 b/active/CVE-2012-2121
index cdf83cc8..d736c2a2 100644
--- a/active/CVE-2012-2121
+++ b/active/CVE-2012-2121
@@ -7,4 +7,3 @@ upstream: released (3.4-rc4) [32f6daad4651a748a58a3ab6da0611862175722f, 21a1416a
sid: pending (3.2.17-1) [bugfix/all/kvm-lock-slots_lock-around-device-assignment.patch]
2.6.32-squeeze-security: ignored (2.6.32-44) "needs port"
3.2-upstream-stable: released (3.2.19) [1e57aab4e6c549804298f07fac0b6fc77f10fab2, 50fcec93e8c917b4f6e1a3219207d351e6eae1b2]
-
diff --git a/active/CVE-2012-2123 b/active/CVE-2012-2123
index 2058c295..3598e331 100644
--- a/active/CVE-2012-2123
+++ b/active/CVE-2012-2123
@@ -7,4 +7,3 @@ upstream: released (3.4-rc4) [d52fc5dde171f030170a6cb78034d166b13c9445, 51b79bee
sid: released (3.2.16-1)
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch]
3.2-upstream-stable: released (3.2.16) [f2c309c36d0a433c88534082cb2c3a817d6bd409, fd18a0805b2b68228c0493337000f63c2573cc0c]
-
diff --git a/active/CVE-2012-2133 b/active/CVE-2012-2133
index aedd69e8..d489b28b 100644
--- a/active/CVE-2012-2133
+++ b/active/CVE-2012-2133
@@ -8,4 +8,3 @@ upstream: released (3.4-rc1) [90481622d75715bfcb68501280a917dbfe516029]
sid: released (3.2.19-1) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch]
3.2-upstream-stable: needed
-
diff --git a/active/CVE-2012-2136 b/active/CVE-2012-2136
index ba1b7566..65c2fa77 100644
--- a/active/CVE-2012-2136
+++ b/active/CVE-2012-2136
@@ -9,4 +9,3 @@ upstream:
sid: released (3.2.20-1)
2.6.32-squeeze-security:
3.2-upstream-stable:
-
diff --git a/active/CVE-2012-2137 b/active/CVE-2012-2137
index aad26839..3f7d2c58 100644
--- a/active/CVE-2012-2137
+++ b/active/CVE-2012-2137
@@ -7,4 +7,4 @@ upstream:
2.6.32-upstream-stable:
sid: released (3.2.20-1)
2.6.32-squeeze-security:
-3.2-upstream-stable: \ No newline at end of file
+3.2-upstream-stable:
diff --git a/active/CVE-2012-2313 b/active/CVE-2012-2313
index e4ece874..81818e6a 100644
--- a/active/CVE-2012-2313
+++ b/active/CVE-2012-2313
@@ -11,4 +11,3 @@ upstream: released (3.4-rc4) [1bb57e940e1958e40d51f2078f50c3a96a9b2d75]
sid: pending (3.2.19-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.19) [bdd06be083b51fa7bdf04d8c8b699870f29bae69]
-
diff --git a/active/CVE-2012-2319 b/active/CVE-2012-2319
index 5b2c2489..999d25f8 100644
--- a/active/CVE-2012-2319
+++ b/active/CVE-2012-2319
@@ -7,4 +7,3 @@ upstream: released (3.4-rc6) [6f24f892871acc47b40dd594c63606a17c714f77]
sid: pending (3.2.17-1)
2.6.32-squeeze-security: needed
3.2-upstream-stable: released (3.2.17) [d4af6eb924ce29b9e46037134ca69ce085b5c36c]
-
diff --git a/active/CVE-2012-2372 b/active/CVE-2012-2372
index fd680bbc..81c6df1b 100644
--- a/active/CVE-2012-2372
+++ b/active/CVE-2012-2372
@@ -7,4 +7,4 @@ upstream:
2.6.32-upstream-stable:
sid:
2.6.32-squeeze-security:
-3.2-upstream-stable: \ No newline at end of file
+3.2-upstream-stable:
diff --git a/active/CVE-2012-2373 b/active/CVE-2012-2373
index 42f955d0..36d3b0a3 100644
--- a/active/CVE-2012-2373
+++ b/active/CVE-2012-2373
@@ -8,4 +8,3 @@ upstream:
sid: released (3.2.19-1) [bugfix/x86/mm-pmd_read_atomic-fix-32bit-pae-pmd-walk-vs-pmd_populate-smp-race.patch]
2.6.32-squeeze-security:
3.2-upstream-stable: pending [queue-3.2/mm-pmd_read_atomic-fix-32bit-pae-pmd-walk-vs-pmd_populate-smp-race.patch]
-
diff --git a/active/CVE-2012-2375 b/active/CVE-2012-2375
index 272244cc..cb52ae9d 100644
--- a/active/CVE-2012-2375
+++ b/active/CVE-2012-2375
@@ -8,4 +8,3 @@ upstream: released (3.4) [20e0fa98b751facf9a1101edaefbc19c82616a68,5794d21ef4639
sid: pending (3.2.19-1)
2.6.32-squeeze-security:
3.2-upstream-stable: releaed (3.2.19) [a94841724154dac38ce5239d1d88c00e758dc20d, b7d52ac86a9753520a696af25d333e3451eeae92, 84e017e3ff4113a32c827f2d7f96e1a9b1f7a677]
-
diff --git a/active/CVE-2012-2383 b/active/CVE-2012-2383
index 1c192a7a..9e5c16f7 100644
--- a/active/CVE-2012-2383
+++ b/active/CVE-2012-2383
@@ -7,4 +7,3 @@ upstream: released (3.4) [ed8cd3b2cd61004cab85380c52b1817aca1ca49b]
sid: released (3.2.17-1)
2.6.32-squeeze-security: N/A "Introduced in 2.6.39 with 8408c282"
3.2-upstream-stable: released (3.2.17) [a9206caacef21a1eeee7083d8fb188cfeb15fd52]
-
diff --git a/active/CVE-2012-2384 b/active/CVE-2012-2384
index caa31e8b..e516eb1a 100644
--- a/active/CVE-2012-2384
+++ b/active/CVE-2012-2384
@@ -7,4 +7,3 @@ upstream: released (3.4) [44afb3a04391a74309d16180d1e4f8386fdfa745]
sid: released (3.2.17-1)
2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 432e58ed"
3.2-upstream-stable: released (3.2.17) [c9b310ee2b2a50ffaa6ea0ca9226c64a12ed0c54]
-
diff --git a/active/CVE-2012-2669 b/active/CVE-2012-2669
index 8199fa60..64bbf86b 100644
--- a/active/CVE-2012-2669
+++ b/active/CVE-2012-2669
@@ -7,4 +7,4 @@ upstream: needed
2.6.32-upstream-stable: N/A "userspace daemon not yet present"
sid: N/A "We don't build the hyperv tools yet"
2.6.32-squeeze-security: N/A "userspace daemon not yet present"
-3.2-upstream-stable: needed \ No newline at end of file
+3.2-upstream-stable: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy