[kernel-sec-discuss] r1426 - active
Dann Frazier
dannf at alioth.debian.org
Mon Jul 20 05:39:38 UTC 2009
Author: dannf
Date: 2009-07-20 05:39:37 +0000 (Mon, 20 Jul 2009)
New Revision: 1426
Modified:
active/CVE-2009-0747
active/CVE-2009-1385
active/CVE-2009-1895
active/CVE-2009-1897
active/CVE-2009-2287
Log:
debian updates
Modified: active/CVE-2009-0747
===================================================================
--- active/CVE-2009-0747 2009-07-17 07:25:55 UTC (rev 1425)
+++ active/CVE-2009-0747 2009-07-20 05:39:37 UTC (rev 1426)
@@ -19,7 +19,7 @@
jmm> security tracker
Bugs:
upstream: released (2.6.28.7, 2.6.29-rc4)
-linux-2.6: pending (2.6.28-2) [bugfix/all/stable/2.6.28.7.patch]
+linux-2.6: released (2.6.28-2) [bugfix/all/stable/2.6.28.7.patch]
2.6.18-etch-security: N/A
2.6.24-etch-security: N/A "code not present"
2.6.26-lenny-security: released (2.6.26-13lenny2) [bugfix/all/ext4-only-use-i_size_high-for-regular-files.patch]
Modified: active/CVE-2009-1385
===================================================================
--- active/CVE-2009-1385 2009-07-17 07:25:55 UTC (rev 1425)
+++ active/CVE-2009-1385 2009-07-20 05:39:37 UTC (rev 1426)
@@ -5,7 +5,7 @@
Notes:
Bugs: 532721
upstream: released (2.6.30-rc8) [ea30e11970a96cfe5e32c03a29332554573b4a10]
-linux-2.6: pending (2.6.30-1)
+linux-2.6: released (2.6.30-1)
2.6.18-etch-security: pending (2.6.18.dfsg.1-24etch3) [bugfix/all/e1000-add-missing-length-check-to-e1000-receive-routine.patch]
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch2) [bugfix/all/e1000-add-missing-length-check-to-e1000-receive-routine.patch]
2.6.26-lenny-security: released (2.6.26-16) [bugfix/all/e1000-add-missing-length-check-to-e1000-receive-routine.patch]
Modified: active/CVE-2009-1895
===================================================================
--- active/CVE-2009-1895 2009-07-17 07:25:55 UTC (rev 1425)
+++ active/CVE-2009-1895 2009-07-20 05:39:37 UTC (rev 1426)
@@ -5,10 +5,10 @@
Notes:
Bugs:
upstream: released (2.6.31-rc3) [f9fabcb58a6d26d6efde842d1703ac7cfa9427b6]
-linux-2.6: pending (2.6.30-3) [bugfix/all/personality-fix-PER_CLEAR_ON_SETID.patch]
+linux-2.6: released (2.6.30-3) [bugfix/all/personality-fix-PER_CLEAR_ON_SETID.patch]
2.6.18-etch-security:
2.6.24-etch-security:
-2.6.26-lenny-security:
+2.6.26-lenny-security: pending (2.6.26-17lenny1) [bugfix/all/personality-fix-PER_CLEAR_ON_SETID.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
Modified: active/CVE-2009-1897
===================================================================
--- active/CVE-2009-1897 2009-07-17 07:25:55 UTC (rev 1425)
+++ active/CVE-2009-1897 2009-07-20 05:39:37 UTC (rev 1426)
@@ -7,9 +7,9 @@
Ubuntu-Description:
Notes:
According to description, vulnerability introduced in commit 33dccbb050bbe35b88ca8cf1228dcf3e4d4b3554, so only 2.6.30 affected.
-Bugs:
+Bugs: 537409
upstream: pending (2.6.31-rc4) [3c8a9c63d5fd738c261bd0ceece04d9c8357ca13]
-linux-2.6: pending (2.6.30-3) [bugfix/all/tun-tap-fix-crash-on-open-and-poll.patch]
+linux-2.6: released (2.6.30-3) [bugfix/all/tun-tap-fix-crash-on-open-and-poll.patch]
2.6.18-etch-security: N/A "introduced after 2.6.29"
2.6.24-etch-security: N/A "introduced after 2.6.29"
2.6.26-lenny-security: N/A "introduced after 2.6.29"
Modified: active/CVE-2009-2287
===================================================================
--- active/CVE-2009-2287 2009-07-17 07:25:55 UTC (rev 1425)
+++ active/CVE-2009-2287 2009-07-20 05:39:37 UTC (rev 1426)
@@ -9,7 +9,7 @@
Notes:
Bugs:
upstream: released (2.6.30.1, 2.6.31-rc1)
-linux-2.6: pending (2.6.30-2) [bugfix/all/stable/2.6.30.1.patch]
+linux-2.6: released (2.6.30-2) [bugfix/all/stable/2.6.30.1.patch]
2.6.18-etch-security: N/A "no kvm"
2.6.24-etch-security:
2.6.26-lenny-security: pending (2.6.26-17lenny1) [bugfix/x86/kvm-check-for-cr3-validity-in-ioctl_set_sregs.patch]
More information about the kernel-sec-discuss
mailing list