[kernel-sec-discuss] r1426 - active

Dann Frazier dannf at alioth.debian.org
Mon Jul 20 05:39:38 UTC 2009


Author: dannf
Date: 2009-07-20 05:39:37 +0000 (Mon, 20 Jul 2009)
New Revision: 1426

Modified:
   active/CVE-2009-0747
   active/CVE-2009-1385
   active/CVE-2009-1895
   active/CVE-2009-1897
   active/CVE-2009-2287
Log:
debian updates

Modified: active/CVE-2009-0747
===================================================================
--- active/CVE-2009-0747	2009-07-17 07:25:55 UTC (rev 1425)
+++ active/CVE-2009-0747	2009-07-20 05:39:37 UTC (rev 1426)
@@ -19,7 +19,7 @@
  jmm> security tracker
 Bugs:
 upstream: released (2.6.28.7, 2.6.29-rc4)
-linux-2.6: pending (2.6.28-2) [bugfix/all/stable/2.6.28.7.patch]
+linux-2.6: released (2.6.28-2) [bugfix/all/stable/2.6.28.7.patch]
 2.6.18-etch-security: N/A
 2.6.24-etch-security: N/A "code not present"
 2.6.26-lenny-security: released (2.6.26-13lenny2) [bugfix/all/ext4-only-use-i_size_high-for-regular-files.patch]

Modified: active/CVE-2009-1385
===================================================================
--- active/CVE-2009-1385	2009-07-17 07:25:55 UTC (rev 1425)
+++ active/CVE-2009-1385	2009-07-20 05:39:37 UTC (rev 1426)
@@ -5,7 +5,7 @@
 Notes:
 Bugs: 532721
 upstream: released (2.6.30-rc8) [ea30e11970a96cfe5e32c03a29332554573b4a10]
-linux-2.6: pending (2.6.30-1)
+linux-2.6: released (2.6.30-1)
 2.6.18-etch-security: pending (2.6.18.dfsg.1-24etch3) [bugfix/all/e1000-add-missing-length-check-to-e1000-receive-routine.patch]
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch2) [bugfix/all/e1000-add-missing-length-check-to-e1000-receive-routine.patch]
 2.6.26-lenny-security: released (2.6.26-16) [bugfix/all/e1000-add-missing-length-check-to-e1000-receive-routine.patch]

Modified: active/CVE-2009-1895
===================================================================
--- active/CVE-2009-1895	2009-07-17 07:25:55 UTC (rev 1425)
+++ active/CVE-2009-1895	2009-07-20 05:39:37 UTC (rev 1426)
@@ -5,10 +5,10 @@
 Notes:
 Bugs:
 upstream: released (2.6.31-rc3) [f9fabcb58a6d26d6efde842d1703ac7cfa9427b6]
-linux-2.6: pending (2.6.30-3) [bugfix/all/personality-fix-PER_CLEAR_ON_SETID.patch]
+linux-2.6: released (2.6.30-3) [bugfix/all/personality-fix-PER_CLEAR_ON_SETID.patch]
 2.6.18-etch-security:
 2.6.24-etch-security:
-2.6.26-lenny-security:
+2.6.26-lenny-security: pending (2.6.26-17lenny1) [bugfix/all/personality-fix-PER_CLEAR_ON_SETID.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:
 2.6.24-hardy-security:

Modified: active/CVE-2009-1897
===================================================================
--- active/CVE-2009-1897	2009-07-17 07:25:55 UTC (rev 1425)
+++ active/CVE-2009-1897	2009-07-20 05:39:37 UTC (rev 1426)
@@ -7,9 +7,9 @@
 Ubuntu-Description:
 Notes:
  According to description, vulnerability introduced in commit 33dccbb050bbe35b88ca8cf1228dcf3e4d4b3554, so only 2.6.30 affected.
-Bugs:
+Bugs: 537409
 upstream: pending (2.6.31-rc4) [3c8a9c63d5fd738c261bd0ceece04d9c8357ca13]
-linux-2.6: pending (2.6.30-3) [bugfix/all/tun-tap-fix-crash-on-open-and-poll.patch]
+linux-2.6: released (2.6.30-3) [bugfix/all/tun-tap-fix-crash-on-open-and-poll.patch]
 2.6.18-etch-security: N/A "introduced after 2.6.29"
 2.6.24-etch-security: N/A "introduced after 2.6.29"
 2.6.26-lenny-security: N/A "introduced after 2.6.29"

Modified: active/CVE-2009-2287
===================================================================
--- active/CVE-2009-2287	2009-07-17 07:25:55 UTC (rev 1425)
+++ active/CVE-2009-2287	2009-07-20 05:39:37 UTC (rev 1426)
@@ -9,7 +9,7 @@
 Notes:
 Bugs:
 upstream: released (2.6.30.1, 2.6.31-rc1)
-linux-2.6: pending (2.6.30-2) [bugfix/all/stable/2.6.30.1.patch]
+linux-2.6: released (2.6.30-2) [bugfix/all/stable/2.6.30.1.patch]
 2.6.18-etch-security: N/A "no kvm"
 2.6.24-etch-security:
 2.6.26-lenny-security: pending (2.6.26-17lenny1) [bugfix/x86/kvm-check-for-cr3-validity-in-ioctl_set_sregs.patch]




More information about the kernel-sec-discuss mailing list