[kernel-sec-discuss] r2317 - active

Dann Frazier dannf at alioth.debian.org
Wed May 18 15:35:06 UTC 2011


Author: dannf
Date: 2011-05-18 15:35:03 +0000 (Wed, 18 May 2011)
New Revision: 2317

Modified:
   active/00example
   active/00pkglist
   active/CVE-2010-2524
   active/CVE-2010-2653
   active/CVE-2010-2943
   active/CVE-2010-2955
   active/CVE-2010-2962
   active/CVE-2010-3848
   active/CVE-2010-3875
   active/CVE-2010-4075
   active/CVE-2010-4076
   active/CVE-2010-4077
   active/CVE-2010-4249
   active/CVE-2010-4251
   active/CVE-2010-4655
   active/CVE-2010-memcontrol-null-ptr-dereference
   active/CVE-2011-0695
   active/CVE-2011-0710
   active/CVE-2011-0711
   active/CVE-2011-0726
   active/CVE-2011-1010
   active/CVE-2011-1012
   active/CVE-2011-1016
   active/CVE-2011-1017
   active/CVE-2011-1020
   active/CVE-2011-1078
   active/CVE-2011-1079
   active/CVE-2011-1080
   active/CVE-2011-1082
   active/CVE-2011-1083
   active/CVE-2011-1090
   active/CVE-2011-1093
   active/CVE-2011-1160
   active/CVE-2011-1161
   active/CVE-2011-1162
   active/CVE-2011-1163
   active/CVE-2011-1169
   active/CVE-2011-1170
   active/CVE-2011-1171
   active/CVE-2011-1172
   active/CVE-2011-1173
   active/CVE-2011-1180
   active/CVE-2011-1182
   active/CVE-2011-1476
   active/CVE-2011-1477
   active/CVE-2011-1478
   active/CVE-2011-1493
   active/CVE-2011-1494
   active/CVE-2011-1495
   active/CVE-2011-1577
   active/CVE-2011-1581
   active/CVE-2011-1585
   active/CVE-2011-1593
   active/CVE-2011-1598
   active/CVE-2011-1745
   active/CVE-2011-1746
   active/CVE-2011-1747
   active/CVE-2011-1748
   active/CVE-2011-1759
   active/CVE-2011-1767
   active/CVE-2011-1768
   active/CVE-2011-1770
   active/CVE-2011-1771
   active/CVE-2011-1776
   active/CVE-2011-1927
   active/CVE-2011-2022
   active/rose-CALL_REQUEST-length-checks
Log:
As discussed on irc, let's rename linux-2.6 to sid to remove doubt about what
this field means. Only changing the active ones for now - I'm not sure that
we always used these semantics historically. Also, I had one linux-2.6 entry
marked as fixed w/ an experimental upload - clear that. I don't think we should
try and track experimental.



Modified: active/00example
===================================================================
--- active/00example	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/00example	2011-05-18 15:35:03 UTC (rev 2317)
@@ -28,7 +28,7 @@
 ## Prerequisite patches maybe listed in [] as well, even though they may not be
 ## directly part of the fix.
 upstream: released (2.6.12, 2.4.29-rc3), pending (2.6.11.3)
-linux-2.6: pending (2.6.12-9)
+sid: pending (2.6.12-9)
 2.6.8-sarge-security: released (2.6.8-16sarge1) [patchname.patch, prerequisite.dpatch, prerequisite2.dpatch]
 2.4.27-sarge-security: needed
 2.4.27: N/A

Modified: active/00pkglist
===================================================================
--- active/00pkglist	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/00pkglist	2011-05-18 15:35:03 UTC (rev 2317)
@@ -1,4 +1,4 @@
-linux-2.6
+sid
 2.6.8-sarge-security
 2.4.27-sarge-security
 2.6.18-etch-security

Modified: active/CVE-2010-2524
===================================================================
--- active/CVE-2010-2524	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-2524	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.35) [4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7]
 2.6.32-upstream-stable: released (2.6.32.17) [4ff7ffd]
-linux-2.6: released (2.6.32-19) [bugfix/all/stable/2.6.32.17.patch]
+sid: released (2.6.32-19) [bugfix/all/stable/2.6.32.17.patch]
 2.6.26-lenny-security: needed "needs port - upstream patch depends on newer key api"
 2.6.32-squeeze-security: released (2.6.32-19) [bugfix/all/stable/2.6.32.17.patch]

Modified: active/CVE-2010-2653
===================================================================
--- active/CVE-2010-2653	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-2653	2011-05-18 15:35:03 UTC (rev 2317)
@@ -9,6 +9,6 @@
 Bugs:
 upstream: released (2.6.34-rc2) [e74d098c]
 2.6.32-upstream-stable: released (2.6.32.28)
-linux-2.6: released (2.6.32-25) [bugfix/all/hvc_console-fix-race-between-hvc_close-and-hvc_remove.patch, bugfix/all/hvc_console-fix-race-between-hvc_close-and-hvc_remove-2.patch]
+sid: released (2.6.32-25) [bugfix/all/hvc_console-fix-race-between-hvc_close-and-hvc_remove.patch, bugfix/all/hvc_console-fix-race-between-hvc_close-and-hvc_remove-2.patch]
 2.6.26-lenny-security: "needs port"
 2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/hvc_console-fix-race-between-hvc_close-and-hvc_remove.patch, bugfix/all/hvc_console-fix-race-between-hvc_close-and-hvc_remove-2.patch]

Modified: active/CVE-2010-2943
===================================================================
--- active/CVE-2010-2943	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-2943	2011-05-18 15:35:03 UTC (rev 2317)
@@ -9,6 +9,6 @@
 Bugs:
 upstream: release (2.6.35) [7dce11db,7124fe0a,1920779e,7b6259e7]
 2.6.32-upstream-stable: released (2.6.32.30)
-linux-2.6: released (2.6.37-1) [bugfix/all/xfs-always-use-iget-in-bulkstat.patch, bugfix/all/xfs-validate-untrusted-inode-numbers-during-lookup.patch, bugfix/all/xfs-rename-XFS_IGET_BULKSTAT-to-XFS_IGET_UNTRUSTED.patch, bugfix/all/xfs-remove-block-number-from-inode-lookup-code.patch, bugfix/all/xfs-fix-untrusted-inode-number-lookup.patch]
+sid: released (2.6.37-1) [bugfix/all/xfs-always-use-iget-in-bulkstat.patch, bugfix/all/xfs-validate-untrusted-inode-numbers-during-lookup.patch, bugfix/all/xfs-rename-XFS_IGET_BULKSTAT-to-XFS_IGET_UNTRUSTED.patch, bugfix/all/xfs-remove-block-number-from-inode-lookup-code.patch, bugfix/all/xfs-fix-untrusted-inode-number-lookup.patch]
 2.6.26-lenny-security: needed "test case fails on 2.6.26"
 2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/xfs-always-use-iget-in-bulkstat.patch, bugfix/all/xfs-validate-untrusted-inode-numbers-during-lookup.patch, bugfix/all/xfs-rename-XFS_IGET_BULKSTAT-to-XFS_IGET_UNTRUSTED.patch, bugfix/all/xfs-remove-block-number-from-inode-lookup-code.patch, bugfix/all/xfs-fix-untrusted-inode-number-lookup.patch]

Modified: active/CVE-2010-2955
===================================================================
--- active/CVE-2010-2955	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-2955	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.36-rc4) [42da2f9]
 2.6.32-upstream-stable: released (2.6.32.22) [wireless-extensions-fix-kernel-heap-content-leak.patch]
-linux-2.6: released (2.6.32-23) [bugfix/all/wireless-extensions-fix-kernel-heap-content-leak.patch]
+sid: released (2.6.32-23) [bugfix/all/wireless-extensions-fix-kernel-heap-content-leak.patch]
 2.6.26-lenny-security: needed "needs port"
 2.6.32-squeeze-security: released (2.6.32-23) [bugfix/all/wireless-extensions-fix-kernel-heap-content-leak.patch]

Modified: active/CVE-2010-2962
===================================================================
--- active/CVE-2010-2962	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-2962	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released  (2.6.36-rc7) [ce9d419dbecc292cc3e06e8b1d6d123d3fa813a4]
 2.6.32-upstream-stable: needed
-linux-2.6: released (2.6.32-25) [bugfix/all/drm-i915-sanity-check-pread+pwrite.patch]
+sid: released (2.6.32-25) [bugfix/all/drm-i915-sanity-check-pread+pwrite.patch]
 2.6.26-lenny-security: N/A
 2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/drm-i915-sanity-check-pread+pwrite.patch]

Modified: active/CVE-2010-3848
===================================================================
--- active/CVE-2010-3848	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-3848	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.37-rc4) [a27e13d370415add3487949c60810e36069a23a6]
 2.6.32-upstream-stable: pending (2.6.32.50)
-linux-2.6: released (2.6.32-28) [debian/patches/bugfix/all/econet-coalesced-iovec.patch]
+sid: released (2.6.32-28) [debian/patches/bugfix/all/econet-coalesced-iovec.patch]
 2.6.26-lenny-security: released (2.6.26-26lenny1) [bugfix/all/econet-coalesced-iovec.patch]
 2.6.32-squeeze-security: released (2.6.32-28) [debian/patches/bugfix/all/econet-coalesced-iovec.patch]

Modified: active/CVE-2010-3875
===================================================================
--- active/CVE-2010-3875	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-3875	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.37-rc2) [fe10ae5, 5b919f833d9d60588d026ad82d17f17e8872c7a9]
 2.6.32-upstream-stable: released (2.6.32.39)
-linux-2.6: released (2.6.38-1)
+sid: released (2.6.38-1)
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: released (2.6.32-34)

Modified: active/CVE-2010-4075
===================================================================
--- active/CVE-2010-4075	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-4075	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (2.6.37) [d281da7ff6f70efca0553c288bb883e8605b3862]
 2.6.32-upstream-stable: needed
-linux-2.6: released (2.6.37-1)
+sid: released (2.6.37-1)
 2.6.26-lenny-security: needed "ABI breaker"
 2.6.32-squeeze-security: released (2.6.32-31)
 

Modified: active/CVE-2010-4076
===================================================================
--- active/CVE-2010-4076	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-4076	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.37) [0587102cf9f427c185bfdeb2cef41e13ee0264b1 ,d281da7ff6f70efca0553c288bb883e8605b3862]
 2.6.32-upstream-stable: needed
-linux-2.6: pending (2.6.37-1)
+sid: pending (2.6.37-1)
 2.6.26-lenny-security: needed "ABI breaker"
 2.6.32-squeeze-security: pending (2.6.32-31)

Modified: active/CVE-2010-4077
===================================================================
--- active/CVE-2010-4077	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-4077	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.37) [0587102cf9f427c185bfdeb2cef41e13ee0264b1 , d281da7ff6f70efca0553c288bb883e8605b3862]
 2.6.32-upstream-stable: needed
-linux-2.6: pending (2.6.37-1)
+sid: pending (2.6.37-1)
 2.6.26-lenny-security: needed "ABI breaker"
 2.6.32-squeeze-security: pending (2.6.32-31)

Modified: active/CVE-2010-4249
===================================================================
--- active/CVE-2010-4249	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-4249	2011-05-18 15:35:03 UTC (rev 2317)
@@ -31,7 +31,7 @@
 Bugs:
 upstream: released (2.6.38) [25888e30319f8896fc656fc68643e6a078263060, 9915672d41273f5b77f1b3c29b391ffb7732b84b, bba14de98753cb6599a2dae0e520714b2153522d]
 2.6.32-upstream-stable: needed
-linux-2.6: released (2.6.32-30) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch]
+sid: released (2.6.32-30) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch]
 2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch]
 2.6.32-squeeze-security: released (2.6.32-30) [bugfix/all/af_unix-limit-unix_tot_inflight.patch, bugfix/all/scm-lower-SCM_MAX_FD.patch, bugfix/all/af_unix-limit-recursion-level.patch]
 

Modified: active/CVE-2010-4251
===================================================================
--- active/CVE-2010-4251	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-4251	2011-05-18 15:35:03 UTC (rev 2317)
@@ -14,6 +14,6 @@
 Bugs: 592187
 upstream: released (2.6.34)
 2.6.32-upstream-stable: needed
-linux-2.6: needed "<dannf> We appear to already have all but the last since 2.6.32-22; I've a tentative backport for the last one"
+sid: needed "<dannf> We appear to already have all but the last since 2.6.32-22; I've a tentative backport for the last one"
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: needed "<dannf> We appear to already have all but the last since 2.6.32-22; I've a tentative backport for the last one"

Modified: active/CVE-2010-4655
===================================================================
--- active/CVE-2010-4655	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-4655	2011-05-18 15:35:03 UTC (rev 2317)
@@ -8,6 +8,6 @@
 Bugs:
 upstream: released (2.6.37) [b00916b189d13a615ff05c9242201135992fcda3]
 2.6.32-upstream-stable: released (2.6.32.25)
-linux-2.6: released (2.6.37-1)
+sid: released (2.6.37-1)
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/net-clear-heap-allocations-for-privileged-ethtool-actions.patch]
 2.6.32-squeeze-security: released (2.6.32-27)

Modified: active/CVE-2010-memcontrol-null-ptr-dereference
===================================================================
--- active/CVE-2010-memcontrol-null-ptr-dereference	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2010-memcontrol-null-ptr-dereference	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.34-rc6) [93d5c9be]
 2.6.32-upstream-stable: released (2.6.32.13) [2d554beb]
-linux-2.6: released (2.6.32-13) [bugfix/all/stable/2.6.32.13.patch]
+sid: released (2.6.32-13) [bugfix/all/stable/2.6.32.13.patch]
 2.6.26-lenny-security:
 2.6.32-squeeze-security: released (2.6.32-13) [bugfix/all/stable/2.6.32.13.patch]

Modified: active/CVE-2011-0695
===================================================================
--- active/CVE-2011-0695	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-0695	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [25ae21a, 2996343]
 2.6.32-upstream-stable: released (2.6.32.34) [df6f458, b8f71b5]
-linux-2.6: released (2.6.38-2) [bugfix/all/stable/2.6.38.2.patch]
+sid: released (2.6.38-2) [bugfix/all/stable/2.6.38.2.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/rdma-cma-fix-crash-in-request-handlers.patch, bugfix/all/ib-cm-bump-reference-count-on-cm_id-before-invoking-callback.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/stable/2.6.32.34.patch]

Modified: active/CVE-2011-0710
===================================================================
--- active/CVE-2011-0710	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-0710	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.38-rc5) [261cd298a8c363d7985e3482946edb4bfedacf98]
 2.6.32-upstream-stable: released (2.6.32.30)
-linux-2.6: released (2.6.37-2)
+sid: released (2.6.37-2)
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/s390/remove-task_show_regs.patch]
 2.6.32-squeeze-security: released (2.6.32-31) [bugfix/s390/remove-task_show_regs.patch]

Modified: active/CVE-2011-0711
===================================================================
--- active/CVE-2011-0711	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-0711	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.38-rc7) [c4d0c3b097f7584772316ee4d64a09fe0e4ddfca]
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-1)
+sid: released (2.6.38-1)
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/xfs-prevent-leaking-uninitialized-stack-memory-in-FSGEOMETRY_V1.patch, bugfix/all/xfs-zero-proper-structure-size-for-geometry-calls.patch]
 2.6.32-squeeze-security: released (2.6.32-33) [bugfix/all/xfs-prevent-leaking-uninitialized-stack-memory-in-FSGEOMETRY_V1.patch, bugfix/all/xfs-zero-proper-structure-size-for-geometry-calls.patch]

Modified: active/CVE-2011-0726
===================================================================
--- active/CVE-2011-0726	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-0726	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [5883f57ca0008ffc93e09cbb9847a1928e50c6f3]
 2.6.32-upstream-stable: released (2.6.32.36)
-linux-2.6: released (2.6.38-2) [bugfix/all/stable/2.6.38.2.patch]
+sid: released (2.6.38-2) [bugfix/all/stable/2.6.38.2.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/proc-protect-mm-start_code-end_code-in-proc-pid-stat.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/stable/2.6.32.36.patch]

Modified: active/CVE-2011-1010
===================================================================
--- active/CVE-2011-1010	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1010	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.38-rc6) [fa7ea87a057958a8b7926c1a60a3ca6d696328ed]
 2.6.32-upstream-stable: released (2.6.32.30)
-linux-2.6: released (2.6.37-2)
+sid: released (2.6.37-2)
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/fs-partitions-Validate-map_count-in-Mac-partition-tables.patch]
 2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/fs-partitions-Validate-map_count-in-Mac-partition-ta.patch]

Modified: active/CVE-2011-1012
===================================================================
--- active/CVE-2011-1012	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1012	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.38-rc7) [294f6cf48666825d23c9372ef37631232746e40d]
 2.6.32-upstream-stable: released (2.6.32.30)
-linux-2.6: released (2.6.38-1)
+sid: released (2.6.38-1)
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/fs-partitions-Validate-map_count-in-Mac-partition-tables.patch]
 2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/stable/2.6.32.30.patch]

Modified: active/CVE-2011-1016
===================================================================
--- active/CVE-2011-1016	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1016	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.38-rc5) [45e4039c3aea597ede44a264cea322908cdedfe9, fff1ce4dc6113b6fdc4e3a815ca5fd229408f8ef]
 2.6.32-upstream-stable: 
-linux-2.6: released (2.6.38-1)
+sid: released (2.6.38-1)
 2.6.26-lenny-security: "needs port"
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/drm-radeon-kms-check-aa-resolve-registers-on-r300.patch, bugfix/all/drm-radeon-fix-regression-with-aa-resolve-checking.patch]

Modified: active/CVE-2011-1017
===================================================================
--- active/CVE-2011-1017	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1017	2011-05-18 15:35:03 UTC (rev 2317)
@@ -9,6 +9,6 @@
 Bugs:
 upstream: needed
 2.6.32-upstream-stable: needed
-linux-2.6: needed 
+sid: needed 
 2.6.26-lenny-security: needed 
 2.6.32-squeeze-security: needed [bugfix/all/partitions-ldm-fix-oops-caused-by-corrupted-partition-table.patch] "This fix is believed broken, see http://linux.kernel.org/pipermail/stable-review/2011-May/010606.html"

Modified: active/CVE-2011-1020
===================================================================
--- active/CVE-2011-1020	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1020	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: needed
 2.6.32-upstream-stable: needed
-linux-2.6: needed "no upstream fix as of 2011.05.10"
+sid: needed "no upstream fix as of 2011.05.10"
 2.6.26-lenny-security: needed "no upstream fix as of 2011.05.10"
 2.6.32-squeeze-security: needed "no upstream fix as of 2011.05.10"

Modified: active/CVE-2011-1078
===================================================================
--- active/CVE-2011-1078	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1078	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [c4c896e1471aec3b004a693c689f60be3b17ac86]
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/bluetooth-sco-fix-information-leak-to-userspace.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/bluetooth-sco-fix-information-leak-to-userspace.patch]

Modified: active/CVE-2011-1079
===================================================================
--- active/CVE-2011-1079	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1079	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [43629f8f5ea32a998d06d1bb41eefa0e821ff573]
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/bluetooth-bnep-fix-buffer-overflow.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/bluetooth-bnep-fix-buffer-overflow.patch]

Modified: active/CVE-2011-1080
===================================================================
--- active/CVE-2011-1080	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1080	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [d846f71195d57b0bbb143382647c2c6638b04c5a]
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/bridge-netfilter-fix-information-leak.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/bridge-netfilter-fix-information-leak.patch]

Modified: active/CVE-2011-1082
===================================================================
--- active/CVE-2011-1082	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1082	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.38-rc7) [22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e]
 2.6.32-upstream-stable: released (2.6.32.30)
-linux-2.6: released (2.6.38-1)
+sid: released (2.6.38-1)
 2.6.26-lenny-security: "needs port"
 2.6.32-squeeze-security: released (2.6.32-31)

Modified: active/CVE-2011-1083
===================================================================
--- active/CVE-2011-1083	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1083	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: needed
 2.6.32-upstream-stable:
-linux-2.6: needed "no upstream fix as of 2011.05.10"
+sid: needed "no upstream fix as of 2011.05.10"
 2.6.26-lenny-security: needed "no upstream fix as of 2011.05.10"
 2.6.32-squeeze-security: needed "no upstream fix as of 2011.05.10"

Modified: active/CVE-2011-1090
===================================================================
--- active/CVE-2011-1090	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1090	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.38-rc8) [e9e3d724e2145f5039b423c290ce2b2c3d8f94bc]
 2.6.32-upstream-stable: released (2.6.32.40)
-linux-2.6: released (2.6.38-1)
+sid: released (2.6.38-1)
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/nfs4-ensure-that-acl-pages-sent-over-nfs-were-not-allocated-from-the-slab.patch, bugfix/all/nfs4-ensure-that-acl-pages-sent-over-nfs-were-not-allocated-from-the-slab-compilation-warning.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/nfs4-ensure-that-acl-pages-sent-over-nfs-were-not-allocated-from-the-slab.patch, bugfix/all/nfs4-ensure-that-acl-pages-sent-over-nfs-were-not-allocated-from-the-slab-compilation-warning.patch]

Modified: active/CVE-2011-1093
===================================================================
--- active/CVE-2011-1093	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1093	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.38) [720dc34bbbe9493c7bd48b2243058b4e447a929d]
 2.6.32-upstream-stable: released (2.6.32.32)
-linux-2.6: released (2.6.38-1)
+sid: released (2.6.38-1)
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/dccp-fix-oops-on-Reset-after-close.patch]
 2.6.32-squeeze-security: released (2.6.32-31)

Modified: active/CVE-2011-1160
===================================================================
--- active/CVE-2011-1160	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1160	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [1309d7afbed112f0e8e90be9af975550caa0076b] 
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/stable/2.6.32.37.patch]

Modified: active/CVE-2011-1161
===================================================================
--- active/CVE-2011-1161	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1161	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: needed "no upstream fix as of 2011.05.10"
 2.6.32-upstream-stable: needed "no upstream fix as of 2011.05.10"
-linux-2.6: needed "no upstream fix as of 2011.05.10"
+sid: needed "no upstream fix as of 2011.05.10"
 2.6.26-lenny-security: needed "no upstream fix as of 2011.05.10"
 2.6.32-squeeze-security: needed "no upstream fix as of 2011.05.10"

Modified: active/CVE-2011-1162
===================================================================
--- active/CVE-2011-1162	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1162	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: needed "no upstream fix as of 2011.05.02"
 2.6.32-upstream-stable: needed "no upstream fix as of 2011.05.02"
-linux-2.6: needed "no upstream fix as of 2011.05.02"
+sid: needed "no upstream fix as of 2011.05.02"
 2.6.26-lenny-security: needed "no upstream fix as of 2011.05.02"
 2.6.32-squeeze-security: needed "no upstream fix as of 2011.05.02"

Modified: active/CVE-2011-1163
===================================================================
--- active/CVE-2011-1163	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1163	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.38) [34d211a2d5df4984a35b18d8ccacbe1d10abb067, 1eafbfeb7bdf59cfe173304c76188f3fd5f1fd05]
 2.6.32-upstream-stable: released (2.6.32.40)
-linux-2.6: released (2.6.38-1)
+sid: released (2.6.38-1)
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/fix-corrupted-osf-partition-parsing.patch, bugfix/all/increase-osf-partition-limit-from-8-to-18.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/fix-corrupted-osf-partition-parsing.patch, bugfix/all/increase-osf-partition-limit-from-8-to-18.patch]

Modified: active/CVE-2011-1169
===================================================================
--- active/CVE-2011-1169	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1169	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.39-rc1)
 2.6.32-upstream-stable: N/A "Driver introduced in 2.6.35"
-linux-2.6: released (2.6.38-2)
+sid: released (2.6.38-2)
 2.6.26-lenny-security: N/A "Driver introduced in 2.6.35"
 2.6.32-squeeze-security: N/A "Driver introduced in 2.6.35"

Modified: active/CVE-2011-1170
===================================================================
--- active/CVE-2011-1170	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1170	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [42eab94fff18cb1091d3501cd284d6bd6cc9c143]
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/netfilter-arp_tables-fix-infoleak-to-userspace.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/netfilter-arp_tables-fix-infoleak-to-userspace.patch]

Modified: active/CVE-2011-1171
===================================================================
--- active/CVE-2011-1171	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1171	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [78b79876761b86653df89c48a7010b5cbd41a84a]
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/netfilter-ip_tables-fix-infoleak-to-userspace.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/netfilter-ip_tables-fix-infoleak-to-userspace.patch]

Modified: active/CVE-2011-1172
===================================================================
--- active/CVE-2011-1172	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1172	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [6a8ab060779779de8aea92ce3337ca348f973f54]
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/ipv6-netfilter-ip6_tables-fix-infoleak-to-userspace.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/ipv6-netfilter-ip6_tables-fix-infoleak-to-userspace.patch]

Modified: active/CVE-2011-1173
===================================================================
--- active/CVE-2011-1173	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1173	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [67c5c6cb8129c595f21e88254a3fc6b3b841ae8e]
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/econet-4-byte-infoleak-to-the-network.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/econet-4-byte-infoleak-to-the-network.patch]

Modified: active/CVE-2011-1180
===================================================================
--- active/CVE-2011-1180	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1180	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [d370af0ef7951188daeb15bae75db7ba57c67846]
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/all/irda-validate-peer-name-and-attribute-lengths.patch]
 2.6.32-squeeze-security: released (2.6.32-33) [bugfix/all/irda-validate-peer-name-and-attribute-lengths.patch]

Modified: active/CVE-2011-1182
===================================================================
--- active/CVE-2011-1182	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1182	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [da48524eb20662618854bb3df2db01fc65f3070c]
 2.6.32-upstream-stable: released (2.6.32.36) [62a9fca67f7f5838894306ad5ab65af911dc0dfd]
-linux-2.6: pending (2.6.38-2) [bugfix/all/stable/2.6.38.2.patch]
+sid: pending (2.6.38-2) [bugfix/all/stable/2.6.38.2.patch]
 2.6.26-lenny-security: pending (2.6.26-26lenny3) [bugfix/x86/prevent-rt_sigqueueinfo-and-rt_tgsigqueueinfo-from-spoofing-the-signal-code.patch, bugfix/x86/prevent-rt_sigqueueinfo-and-rt_tgsigqueueinfo-from-spoofing-the-signal-code-regression.patch]
 2.6.32-squeeze-security: released (2.6.32-32) [bugfix/all/stable/2.6.32.36.patch]

Modified: active/CVE-2011-1476
===================================================================
--- active/CVE-2011-1476	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1476	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [b769f49463711205d57286e64cf535ed4daf59e9]
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: needed 
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/stable/2.6.32.37.patch]

Modified: active/CVE-2011-1477
===================================================================
--- active/CVE-2011-1477	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1477	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [b769f49463711205d57286e64cf535ed4daf59e9]
 2.6.32-upstream-stable: released (2.6.32.37) [ef79e147a62e11f6a657b076bc98192fba725645]
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: needed 
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/stable/2.6.32.37.patch]

Modified: active/CVE-2011-1478
===================================================================
--- active/CVE-2011-1478	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1478	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.38)
 2.6.32-upstream-stable: released (2.6.32.37)
-linux-2.6: released (2.6.38-1)
+sid: released (2.6.38-1)
 2.6.26-lenny-security: 
 2.6.32-squeeze-security: released (2.6.32-34)

Modified: active/CVE-2011-1493
===================================================================
--- active/CVE-2011-1493	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1493	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [be20250c13f88375345ad99950190685eda51eb8]
 2.6.32-upstream-stable: released (2.6.32.37) [62fdb8668c631619251cff6d964556e0f67b8dcd]
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.3.patch]
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/stable/2.6.32.37.patch]

Modified: active/CVE-2011-1494
===================================================================
--- active/CVE-2011-1494	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1494	2011-05-18 15:35:03 UTC (rev 2317)
@@ -9,6 +9,6 @@
 Bugs:
 upstream: pending (2.6.39-rc6) [a1f74ae82d133ebb2aabb19d181944b4e83e9960]
 2.6.32-upstream-stable: released (2.6.32.40)
-linux-2.6: released (2.6.38-5)
+sid: released (2.6.38-5)
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/mpt2sas-prevent-heap-overflows-and-unchecked-reads.patch]

Modified: active/CVE-2011-1495
===================================================================
--- active/CVE-2011-1495	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1495	2011-05-18 15:35:03 UTC (rev 2317)
@@ -9,6 +9,6 @@
 Bugs:
 upstream: pending (2.6.39-rc6) [a1f74ae82d133ebb2aabb19d181944b4e83e9960]
 2.6.32-upstream-stable: released (2.6.32.40)
-linux-2.6: released (2.6.38-5)
+sid: released (2.6.38-5)
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/mpt2sas-prevent-heap-overflows-and-unchecked-reads.patch]

Modified: active/CVE-2011-1577
===================================================================
--- active/CVE-2011-1577	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1577	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: needed
 2.6.32-upstream-stable: needed
-linux-2.6: needed
+sid: needed
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: needed

Modified: active/CVE-2011-1581
===================================================================
--- active/CVE-2011-1581	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1581	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [fd0e435b0fe85622f167b84432552885a4856ac8]
 2.6.32-upstream-stable: N/A "Introduced in 2.6.36 with commit bb1d9123"
-linux-2.6: needed
+sid: needed
 2.6.26-lenny-security: N/A "Introduced in 2.6.36 with commit bb1d9123"
 2.6.32-squeeze-security: N/A "Introduced in 2.6.36 with commit bb1d9123"

Modified: active/CVE-2011-1585
===================================================================
--- active/CVE-2011-1585	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1585	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.36) [4ff67b720c02c36e54d55b88c2931879b7db1cd2, fc87a40677bbe0937e2ff0642c7e83c9a4813f3d, 24e6cf92fde1f140d8eb0bf7cd24c2c78149b6b2]
 2.6.32-upstream-stable: needed
-linux-2.6: released (2.6.37-1)
+sid: released (2.6.37-1)
 2.6.26-lenny-security:
 2.6.32-squeeze-security: pending (2.6.32-34squeeze1) [bugfix/all/cifs-clean-up-cifs_find_smb_ses.patch, bugfix/all/cifs-fix-NULL-pointer-dereference-in-cifs_find_smb_ses.patch, bugfix/all/cifs-check-for-NULL-session-password.patch]

Modified: active/CVE-2011-1593
===================================================================
--- active/CVE-2011-1593	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1593	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: released (2.6.39-rc4) [c78193e9, d8bdc59f]
 2.6.32-upstream-stable: released (2.6.32.39) [67e022f3add1879292986e779b2aaf6ecb93fa58]
-linux-2.6: released (2.6.38-4) [bugfix/all/stable/2.6.38.4.patch]
+sid: released (2.6.38-4) [bugfix/all/stable/2.6.38.4.patch]
 2.6.26-lenny-security:
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/stable/2.6.32.39.patch]

Modified: active/CVE-2011-1598
===================================================================
--- active/CVE-2011-1598	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1598	2011-05-18 15:35:03 UTC (rev 2317)
@@ -7,6 +7,6 @@
 Bugs:
 upstream: pending (2.6.39-rc6) [c6914a6f261aca0c9f715f883a353ae7ff51fe83]
 2.6.32-upstream-stable: released (2.6.32.40)
-linux-2.6: released (2.6.38-5)
+sid: released (2.6.38-5)
 2.6.26-lenny-security:
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/can-add-missing-socket-check-in-can+bcm-release.patch]

Modified: active/CVE-2011-1745
===================================================================
--- active/CVE-2011-1745	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1745	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.39-rc5) [194b3da873fd334ef183806db751473512af29ce]
 2.6.32-upstream-stable: released (2.6.32.40)
-linux-2.6: released (2.6.38-5)
+sid: released (2.6.38-5)
 2.6.26-lenny-security:
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/agp-fix-arbitrary-kernel-memory-writes.patch]

Modified: active/CVE-2011-1746
===================================================================
--- active/CVE-2011-1746	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1746	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.39-rc5) [b522f02184b413955f3bc952e3776ce41edc6355]
 2.6.32-upstream-stable: released (2.6.32.40)
-linux-2.6: released (2.6.38-5)
+sid: released (2.6.38-5)
 2.6.26-lenny-security:
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/agp-fix-OOM-and-buffer-overflow.patch]

Modified: active/CVE-2011-1747
===================================================================
--- active/CVE-2011-1747	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1747	2011-05-18 15:35:03 UTC (rev 2317)
@@ -13,6 +13,6 @@
 Bugs:
 upstream: needed "no upstream fix as of 2011.05.10"
 2.6.32-upstream-stable: needed "no upstream fix as of 2011.05.10"
-linux-2.6: needed "no upstream fix as of 2011.05.10"
+sid: needed "no upstream fix as of 2011.05.10"
 2.6.26-lenny-security: needed "no upstream fix as of 2011.05.10"
 2.6.32-squeeze-security: needed "no upstream fix as of 2011.05.10"

Modified: active/CVE-2011-1748
===================================================================
--- active/CVE-2011-1748	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1748	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: pending (2.6.39-rc6) [10022a6c66e199d8f61d9044543f38785713cbbd]
 2.6.32-upstream-stable: needed
-linux-2.6: needed
+sid: needed
 2.6.26-lenny-security:
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/can-add-missing-socket-check-in-can+raw-release.patch]

Modified: active/CVE-2011-1759
===================================================================
--- active/CVE-2011-1759	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1759	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.39-rc6) [0f22072ab50cac7983f9660d33974b45184da4f9]
 2.6.32-upstream-stable: released (2.6.32.40)
-linux-2.6: needed
+sid: needed
 2.6.26-lenny-security:
 2.6.32-squeeze-security: pending (2.6.32-34squeeze1) [bugfix/arm/prevent-heap-corruption-in-OABI-semtimedop.patch]

Modified: active/CVE-2011-1767
===================================================================
--- active/CVE-2011-1767	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1767	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.34) [c2892f02712e9516d72841d5c019ed6916329794]
 2.6.32-upstream-stable: needed
-linux-2.6: released (2.6.34-1)
+sid: released (2.6.34-1)
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: pending (2.6.32-34squeeze1) [bugfix/all/gre-fix-netns-vs-proto-registration-ordering.patch]

Modified: active/CVE-2011-1768
===================================================================
--- active/CVE-2011-1768	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1768	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.34) [d5aa407f59f5b83d2c50ec88f5bf56d40f1f8978]
 2.6.32-upstream-stable: needed
-linux-2.6: released (2.6.34-1)
+sid: released (2.6.34-1)
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: needed

Modified: active/CVE-2011-1770
===================================================================
--- active/CVE-2011-1770	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1770	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: pending (2.6.39-rc8) [a294865978b701e4d0d90135672749531b9a900d]
 2.6.32-upstream-stable: needed
-linux-2.6: needed
+sid: needed
 2.6.26-lenny-security: N/A "Introduced in 2.6.29 with commit e77b8363b2ea7c0d89919547c1a8b0562f298b57"
 2.6.32-squeeze-security: pending (2.6.32-34squeeze1) [bugfix/all/dccp-handle-invalid-feature-options-length.patch]

Modified: active/CVE-2011-1771
===================================================================
--- active/CVE-2011-1771	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1771	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.39-rc4) [7797069305d13252fd66cf722aa8f2cbeb3c95cd]
 2.6.32-upstream-stable: N/A "Introduced in 2.6.37"
-linux-2.6: release (2.6.38-4) [bugfix/all/stable/2.6.38.4.patch]
+sid: release (2.6.38-4) [bugfix/all/stable/2.6.38.4.patch]
 2.6.26-lenny-security: N/A "Introduced in 2.6.37"
 2.6.32-squeeze-security: N/A "Introduced in 2.6.37"

Modified: active/CVE-2011-1776
===================================================================
--- active/CVE-2011-1776	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1776	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: released (2.6.39-rc7) [fa039d5f6b126fbd65eefa05db2f67e44df8f121]
 2.6.32-upstream-stable: needed
-linux-2.6: needed
+sid: needed
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: pending (2.6.32-34squeeze1) [bugfix/all/validate-size-of-efi-guid-partition-entries.patch]

Modified: active/CVE-2011-1927
===================================================================
--- active/CVE-2011-1927	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-1927	2011-05-18 15:35:03 UTC (rev 2317)
@@ -5,6 +5,6 @@
 Bugs:
 upstream: pending (2.6.39-rc8) [64f3b9e203bd06855072e295557dca1485a2ecba]
 2.6.32-upstream-stable: N/A
-linux-2.6: pending (2.6.38-7) [bugfix/all/net-ip_expire-must-revalidate-route.patch]
+sid: pending (2.6.38-7) [bugfix/all/net-ip_expire-must-revalidate-route.patch]
 2.6.26-lenny-security: N/A
 2.6.32-squeeze-security: N/A

Modified: active/CVE-2011-2022
===================================================================
--- active/CVE-2011-2022	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/CVE-2011-2022	2011-05-18 15:35:03 UTC (rev 2317)
@@ -6,6 +6,6 @@
 Bugs:
 upstream: released (2.6.39-rc5) [194b3da873fd334ef183806db751473512af29ce]
 2.6.32-upstream-stable: released (2.6.32.40)
-linux-2.6: released (2.6.38-5)
+sid: released (2.6.38-5)
 2.6.26-lenny-security:
 2.6.32-squeeze-security: released (2.6.32-34) [bugfix/all/agp-fix-arbitrary-kernel-memory-writes.patch]

Modified: active/rose-CALL_REQUEST-length-checks
===================================================================
--- active/rose-CALL_REQUEST-length-checks	2011-05-18 14:59:59 UTC (rev 2316)
+++ active/rose-CALL_REQUEST-length-checks	2011-05-18 15:35:03 UTC (rev 2317)
@@ -9,6 +9,6 @@
 Bugs:
 upstream: released (2.6.39-rc1) [e0bccd315db0c2f919e7fcf9cb60db21d9986f52]
 2.6.32-upstream-stable: needed
-linux-2.6: released (2.6.39~rc4-1~experimental.1)
+sid: needed
 2.6.26-lenny-security: needed
 2.6.32-squeeze-security: needed




More information about the kernel-sec-discuss mailing list