diff options
author | dann frazier <dannf@debian.org> | 2012-06-12 22:38:45 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2012-06-12 22:38:45 +0000 |
commit | 06a5f465a3f700b46e8c81361da1d0e770cb2d95 (patch) | |
tree | c2e46adfd6e8f2454a5e81f953b1709434b15d83 /active | |
parent | 943bfa8eecd0d0714da987451325b4342b168c4f (diff) |
cleanup eof eols
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2705 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'active')
-rw-r--r-- | active/00boilerplate | 2 | ||||
-rw-r--r-- | active/CVE-2011-1020 | 1 | ||||
-rw-r--r-- | active/CVE-2011-1083 | 1 | ||||
-rw-r--r-- | active/CVE-2011-1747 | 1 | ||||
-rw-r--r-- | active/CVE-2012-0879 | 1 | ||||
-rw-r--r-- | active/CVE-2012-1601 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2121 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2123 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2133 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2136 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2137 | 2 | ||||
-rw-r--r-- | active/CVE-2012-2313 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2319 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2372 | 2 | ||||
-rw-r--r-- | active/CVE-2012-2373 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2375 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2383 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2384 | 1 | ||||
-rw-r--r-- | active/CVE-2012-2669 | 2 |
19 files changed, 4 insertions, 19 deletions
diff --git a/active/00boilerplate b/active/00boilerplate index 39905696..2fcbe3d2 100644 --- a/active/00boilerplate +++ b/active/00boilerplate @@ -6,4 +6,4 @@ upstream: 2.6.32-upstream-stable: sid: 2.6.32-squeeze-security: -3.2-upstream-stable:
\ No newline at end of file +3.2-upstream-stable: diff --git a/active/CVE-2011-1020 b/active/CVE-2011-1020 index 3297439f..ca924bd6 100644 --- a/active/CVE-2011-1020 +++ b/active/CVE-2011-1020 @@ -11,4 +11,3 @@ sid: released (2.6.39-1) 2.6.26-lenny-security: released (2.6.26-26lenny4) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch] 2.6.32-squeeze-security: released (2.6.32-35squeeze1) [bugfix/all/pagemap-close-races-with-suid-execve.patch, bugfix/all/proc-map-report-errors-sanely.patch, bugfix/all/close-race-in-proc-pid-environ.patch, bugfix/all/auxv-require-the-target-or-self-to-be-traceable.patch, bugfix/all/proc-syscall-stack-personality-races.patch] 3.2-upstream-stable: N/A - diff --git a/active/CVE-2011-1083 b/active/CVE-2011-1083 index 020df0c1..8b5ba7be 100644 --- a/active/CVE-2011-1083 +++ b/active/CVE-2011-1083 @@ -10,4 +10,3 @@ upstream: released (3.3-rc1) [28d82dc1c4edbc352129f97f4ca22624d1fe61de] sid: released (3.2.9-1) 2.6.32-squeeze-security: needed 3.2-upstream-stable: released (3.2.9) [203aa5260edca2ab1872ad8b08386d874f7132f3] - diff --git a/active/CVE-2011-1747 b/active/CVE-2011-1747 index 1020215f..de6ba606 100644 --- a/active/CVE-2011-1747 +++ b/active/CVE-2011-1747 @@ -17,4 +17,3 @@ sid: needed "no upstream fix as of 2011.06.20" 2.6.26-lenny-security: needed "no upstream fix as of 2011.06.20" 2.6.32-squeeze-security: needed "no upstream fix as of 2011.06.20" 3.2-upstream-stable: needed "no upstream fix as of 2011.06.20" - diff --git a/active/CVE-2012-0879 b/active/CVE-2012-0879 index 05404646..e23eac9a 100644 --- a/active/CVE-2012-0879 +++ b/active/CVE-2012-0879 @@ -9,4 +9,3 @@ upstream: released (2.6.33) [61cc74fbb87af6aa551a06a370590c9bc07e29d9, b69f22920 sid: released (2.6.33-1) 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/block-Fix-io_context-leak-after-clone-with-CLONE_IO.patch, bugfix/all/block-Fix-io_context-leak-after-failure-of-clone-with-CLONE_IO.patch] 3.2-upstream-stable: N/A - diff --git a/active/CVE-2012-1601 b/active/CVE-2012-1601 index 9038df93..71f6287e 100644 --- a/active/CVE-2012-1601 +++ b/active/CVE-2012-1601 @@ -9,4 +9,3 @@ upstream: released (3.4-rc1) [3e515705a1f46beb1c942bb8043c16f8ac7b1e9e] sid: pending (3.2.17-1) [bugfix/all/kvm-ensure-all-vcpus-are-consistent-with-in-kernel-irqchip.patch] 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/x86/KVM-disallow-multiple-KVM_CREATE_IRQCHIP.patch, bugfix/x86/KVM-Ensure-all-vcpus-are-consistent-with-in-kernel-irqchip-settings.patch] 3.2-upstream-stable: released (3.2.19) [645b177cbfce6b695bdbe0b4c131de584821840d] - diff --git a/active/CVE-2012-2121 b/active/CVE-2012-2121 index cdf83cc8..d736c2a2 100644 --- a/active/CVE-2012-2121 +++ b/active/CVE-2012-2121 @@ -7,4 +7,3 @@ upstream: released (3.4-rc4) [32f6daad4651a748a58a3ab6da0611862175722f, 21a1416a sid: pending (3.2.17-1) [bugfix/all/kvm-lock-slots_lock-around-device-assignment.patch] 2.6.32-squeeze-security: ignored (2.6.32-44) "needs port" 3.2-upstream-stable: released (3.2.19) [1e57aab4e6c549804298f07fac0b6fc77f10fab2, 50fcec93e8c917b4f6e1a3219207d351e6eae1b2] - diff --git a/active/CVE-2012-2123 b/active/CVE-2012-2123 index 2058c295..3598e331 100644 --- a/active/CVE-2012-2123 +++ b/active/CVE-2012-2123 @@ -7,4 +7,3 @@ upstream: released (3.4-rc4) [d52fc5dde171f030170a6cb78034d166b13c9445, 51b79bee sid: released (3.2.16-1) 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/fcaps-clear-the-same-personality-flags-as-suid-when-fcaps-are-used.patch, bugfix/all/security-fix-compile-error-in-commoncap.c.patch] 3.2-upstream-stable: released (3.2.16) [f2c309c36d0a433c88534082cb2c3a817d6bd409, fd18a0805b2b68228c0493337000f63c2573cc0c] - diff --git a/active/CVE-2012-2133 b/active/CVE-2012-2133 index aedd69e8..d489b28b 100644 --- a/active/CVE-2012-2133 +++ b/active/CVE-2012-2133 @@ -8,4 +8,3 @@ upstream: released (3.4-rc1) [90481622d75715bfcb68501280a917dbfe516029] sid: released (3.2.19-1) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch] 2.6.32-squeeze-security: released (2.6.32-44) [bugfix/all/hugepages-fix-use-after-free-bug-in-quota-handling.patch] 3.2-upstream-stable: needed - diff --git a/active/CVE-2012-2136 b/active/CVE-2012-2136 index ba1b7566..65c2fa77 100644 --- a/active/CVE-2012-2136 +++ b/active/CVE-2012-2136 @@ -9,4 +9,3 @@ upstream: sid: released (3.2.20-1) 2.6.32-squeeze-security: 3.2-upstream-stable: - diff --git a/active/CVE-2012-2137 b/active/CVE-2012-2137 index aad26839..3f7d2c58 100644 --- a/active/CVE-2012-2137 +++ b/active/CVE-2012-2137 @@ -7,4 +7,4 @@ upstream: 2.6.32-upstream-stable: sid: released (3.2.20-1) 2.6.32-squeeze-security: -3.2-upstream-stable:
\ No newline at end of file +3.2-upstream-stable: diff --git a/active/CVE-2012-2313 b/active/CVE-2012-2313 index e4ece874..81818e6a 100644 --- a/active/CVE-2012-2313 +++ b/active/CVE-2012-2313 @@ -11,4 +11,3 @@ upstream: released (3.4-rc4) [1bb57e940e1958e40d51f2078f50c3a96a9b2d75] sid: pending (3.2.19-1) 2.6.32-squeeze-security: needed 3.2-upstream-stable: released (3.2.19) [bdd06be083b51fa7bdf04d8c8b699870f29bae69] - diff --git a/active/CVE-2012-2319 b/active/CVE-2012-2319 index 5b2c2489..999d25f8 100644 --- a/active/CVE-2012-2319 +++ b/active/CVE-2012-2319 @@ -7,4 +7,3 @@ upstream: released (3.4-rc6) [6f24f892871acc47b40dd594c63606a17c714f77] sid: pending (3.2.17-1) 2.6.32-squeeze-security: needed 3.2-upstream-stable: released (3.2.17) [d4af6eb924ce29b9e46037134ca69ce085b5c36c] - diff --git a/active/CVE-2012-2372 b/active/CVE-2012-2372 index fd680bbc..81c6df1b 100644 --- a/active/CVE-2012-2372 +++ b/active/CVE-2012-2372 @@ -7,4 +7,4 @@ upstream: 2.6.32-upstream-stable: sid: 2.6.32-squeeze-security: -3.2-upstream-stable:
\ No newline at end of file +3.2-upstream-stable: diff --git a/active/CVE-2012-2373 b/active/CVE-2012-2373 index 42f955d0..36d3b0a3 100644 --- a/active/CVE-2012-2373 +++ b/active/CVE-2012-2373 @@ -8,4 +8,3 @@ upstream: sid: released (3.2.19-1) [bugfix/x86/mm-pmd_read_atomic-fix-32bit-pae-pmd-walk-vs-pmd_populate-smp-race.patch] 2.6.32-squeeze-security: 3.2-upstream-stable: pending [queue-3.2/mm-pmd_read_atomic-fix-32bit-pae-pmd-walk-vs-pmd_populate-smp-race.patch] - diff --git a/active/CVE-2012-2375 b/active/CVE-2012-2375 index 272244cc..cb52ae9d 100644 --- a/active/CVE-2012-2375 +++ b/active/CVE-2012-2375 @@ -8,4 +8,3 @@ upstream: released (3.4) [20e0fa98b751facf9a1101edaefbc19c82616a68,5794d21ef4639 sid: pending (3.2.19-1) 2.6.32-squeeze-security: 3.2-upstream-stable: releaed (3.2.19) [a94841724154dac38ce5239d1d88c00e758dc20d, b7d52ac86a9753520a696af25d333e3451eeae92, 84e017e3ff4113a32c827f2d7f96e1a9b1f7a677] - diff --git a/active/CVE-2012-2383 b/active/CVE-2012-2383 index 1c192a7a..9e5c16f7 100644 --- a/active/CVE-2012-2383 +++ b/active/CVE-2012-2383 @@ -7,4 +7,3 @@ upstream: released (3.4) [ed8cd3b2cd61004cab85380c52b1817aca1ca49b] sid: released (3.2.17-1) 2.6.32-squeeze-security: N/A "Introduced in 2.6.39 with 8408c282" 3.2-upstream-stable: released (3.2.17) [a9206caacef21a1eeee7083d8fb188cfeb15fd52] - diff --git a/active/CVE-2012-2384 b/active/CVE-2012-2384 index caa31e8b..e516eb1a 100644 --- a/active/CVE-2012-2384 +++ b/active/CVE-2012-2384 @@ -7,4 +7,3 @@ upstream: released (3.4) [44afb3a04391a74309d16180d1e4f8386fdfa745] sid: released (3.2.17-1) 2.6.32-squeeze-security: N/A "Introduced in 2.6.38 with 432e58ed" 3.2-upstream-stable: released (3.2.17) [c9b310ee2b2a50ffaa6ea0ca9226c64a12ed0c54] - diff --git a/active/CVE-2012-2669 b/active/CVE-2012-2669 index 8199fa60..64bbf86b 100644 --- a/active/CVE-2012-2669 +++ b/active/CVE-2012-2669 @@ -7,4 +7,4 @@ upstream: needed 2.6.32-upstream-stable: N/A "userspace daemon not yet present" sid: N/A "We don't build the hyperv tools yet" 2.6.32-squeeze-security: N/A "userspace daemon not yet present" -3.2-upstream-stable: needed
\ No newline at end of file +3.2-upstream-stable: needed |