Processed: retitle 640966 to Oops when unprivileged user reads /proc/<pid>/maps, regression in fix for CVE-2011-1020
Processing commands for control@bugs.debian.org:
> retitle 640966 Oops when unprivileged user reads /proc/<pid>/maps, regression in fix for CVE-2011-1020
Bug #640966 [linux-2.6] linux-image-2.6.32-5-(amd64|686): kernel oops after
Bug #640973 [linux-2.6] linux-image-2.6.32-5-(amd64|686): kernel oops after
Bug #641018 [linux-2.6] linux-image-2.6.32-5-(amd64|686): kernel oops after
Bug #641034 [linux-2.6] linux-image-2.6.32-5-(amd64|686): kernel oops after
Bug #641040 [linux-2.6] linux-image-2.6.32-5-(amd64|686): kernel oops after
Changed Bug title to 'Oops when unprivileged user reads /proc/<pid>/maps, regression in fix for CVE-2011-1020' from 'linux-image-2.6.32-5-(amd64|686): kernel oops after'
Changed Bug title to 'Oops when unprivileged user reads /proc/<pid>/maps, regression in fix for CVE-2011-1020' from 'linux-image-2.6.32-5-(amd64|686): kernel oops after'
Changed Bug title to 'Oops when unprivileged user reads /proc/<pid>/maps, regression in fix for CVE-2011-1020' from 'linux-image-2.6.32-5-(amd64|686): kernel oops after'
Changed Bug title to 'Oops when unprivileged user reads /proc/<pid>/maps, regression in fix for CVE-2011-1020' from 'linux-image-2.6.32-5-(amd64|686): kernel oops after'
Changed Bug title to 'Oops when unprivileged user reads /proc/<pid>/maps, regression in fix for CVE-2011-1020' from 'linux-image-2.6.32-5-(amd64|686): kernel oops after'
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
640966: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=640966
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
Reply to: