[kernel-sec-discuss] r1281 - active

dannf at alioth.debian.org dannf at alioth.debian.org
Mon Dec 15 22:38:45 UTC 2008


Author: dannf
Date: 2008-12-15 22:38:45 +0000 (Mon, 15 Dec 2008)
New Revision: 1281

Modified:
   active/CVE-2008-3527
   active/CVE-2008-3528
   active/CVE-2008-4554
   active/CVE-2008-4576
   active/CVE-2008-4933
   active/CVE-2008-4934
   active/CVE-2008-5025
   active/CVE-2008-5029
   active/CVE-2008-5079
   active/CVE-2008-5182
   active/CVE-2008-5300
Log:
released 2.6.18.dfsg.1-23etch1

Modified: active/CVE-2008-3527
===================================================================
--- active/CVE-2008-3527	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-3527	2008-12-15 22:38:45 UTC (rev 1281)
@@ -8,7 +8,7 @@
 Bugs:
 upstream: released
 linux-2.6: N/A
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/add-install_special_mapping.patch, bugfix/i386-vdso-use_install_special_mapping.patch, bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch, features/all/xen/vdso-use_install_special_mapping.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/add-install_special_mapping.patch, bugfix/i386-vdso-use_install_special_mapping.patch, bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch, features/all/xen/vdso-use_install_special_mapping.patch]
 2.6.24-etch-security: N/A
 2.6.26-lenny-security: N/A
 2.6.15-dapper-security: needed

Modified: active/CVE-2008-3528
===================================================================
--- active/CVE-2008-3528	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-3528	2008-12-15 22:38:45 UTC (rev 1281)
@@ -14,7 +14,7 @@
 Bugs:
 upstream:
 linux-2.6: pending (2.6.26-11) [bugfix/all/stable/2.6.26.8.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/ext2-avoid-corrupted-directory-printk-floods.patch, bugfix/ext3-avoid-corrupted-directory-printk-floods.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/ext2-avoid-corrupted-directory-printk-floods.patch, bugfix/ext3-avoid-corrupted-directory-printk-floods.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.7) [bugfix/ext2-avoid-corrupted-directory-printk-floods.patch, bugfix/ext3-avoid-corrupted-directory-printk-floods.patch]
 2.6.26-lenny-security: pending (2.6.26-11) [bugfix/all/stable/2.6.26.8.patch]
 2.6.15-dapper-security: ignored (negligible)

Modified: active/CVE-2008-4554
===================================================================
--- active/CVE-2008-4554	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-4554	2008-12-15 22:38:45 UTC (rev 1281)
@@ -8,7 +8,7 @@
 Bugs:
 upstream:
 linux-2.6: released (2.6.26-9) [bugfix/all/dont-allow-splice-to-files-opened-with-O_APPEND.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.7) [bugfix/all/dont-allow-splice-to-files-opened-with-O_APPEND.patch]
 2.6.26-lenny-security: released (2.6.26-9) [bugfix/all/dont-allow-splice-to-files-opened-with-O_APPEND.patch]
 2.6.15-dapper-security: N/A

Modified: active/CVE-2008-4576
===================================================================
--- active/CVE-2008-4576	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-4576	2008-12-15 22:38:45 UTC (rev 1281)
@@ -8,7 +8,7 @@
 Bugs:
 upstream:
 linux-2.6: released (2.6.26-9) [bugfix/all/stable/2.6.26.6.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.7) [bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch]
 2.6.26-lenny-security: released (2.6.26-9) [bugfix/all/stable/2.6.26.6.patch]
 2.6.15-dapper-security: needed

Modified: active/CVE-2008-4933
===================================================================
--- active/CVE-2008-4933	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-4933	2008-12-15 22:38:45 UTC (rev 1281)
@@ -8,7 +8,7 @@
 Bugs:
 upstream:
 linux-2.6: pending (2.6.26-11) [bugfix/all/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.7) [bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch]
 2.6.26-lenny-security: pending (2.6.26-11) [bugfix/all/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch]
 2.6.15-dapper-security: needed

Modified: active/CVE-2008-4934
===================================================================
--- active/CVE-2008-4934	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-4934	2008-12-15 22:38:45 UTC (rev 1281)
@@ -8,7 +8,7 @@
 Bugs:
 upstream:
 linux-2.6: pending (2.6.26-11) [bugfix/all/hfsplus-check_read_mapping_page-return-value.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/hfsplus-check_read_mapping_page-return-value.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/hfsplus-check_read_mapping_page-return-value.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.7) [bugfix/hfsplus-check_read_mapping_page-return-value.patch]
 2.6.26-lenny-security: pending (2.6.26-11) [bugfix/all/hfsplus-check_read_mapping_page-return-value.patch]
 2.6.15-dapper-security: needed

Modified: active/CVE-2008-5025
===================================================================
--- active/CVE-2008-5025	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-5025	2008-12-15 22:38:45 UTC (rev 1281)
@@ -8,7 +8,7 @@
 Bugs:
 upstream:
 linux-2.6: pending (2.6.26-11) [bugfix/all/hfs-fix-namelength-memory-corruption.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/hfs-fix-namelength-memory-corruption.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/hfs-fix-namelength-memory-corruption.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.7) [bugfix/hfs-fix-namelength-memory-corruption.patch]
 2.6.26-lenny-security: pending (2.6.26-11) [bugfix/all/hfs-fix-namelength-memory-corruption.patch]
 2.6.15-dapper-security: needed

Modified: active/CVE-2008-5029
===================================================================
--- active/CVE-2008-5029	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-5029	2008-12-15 22:38:45 UTC (rev 1281)
@@ -15,7 +15,7 @@
 Bugs:
 upstream: released (2.6.26.8)
 linux-2.6: released (2.6.26-11) [bugfix/all/stable/2.6.26.8.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/af_unix-fix-garbage-collector-races.patch, bugfix/af_unix-convert-socks-to-unix_socks.patch, bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch, bugfix/net-fix-recursive-descent-in-__scm_destroy.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/af_unix-fix-garbage-collector-races.patch, bugfix/af_unix-convert-socks-to-unix_socks.patch, bugfix/net-unix-fix-inflight-counting-bug-in-garbage-collector.patch, bugfix/net-fix-recursive-descent-in-__scm_destroy.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.7) [bugfix/unix-domain-counting-gc.patch, bugfix/unix-domain-recursive-descent.patch, bugfix/unix-domain-recursive-descent-abi-ignore.patch]
 2.6.26-lenny-security: released (2.6.26-11) [bugfix/all/stable/2.6.26.8.patch]
 2.6.15-dapper-security: needed

Modified: active/CVE-2008-5079
===================================================================
--- active/CVE-2008-5079	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-5079	2008-12-15 22:38:45 UTC (rev 1281)
@@ -8,7 +8,7 @@
 Bugs:
 upstream: needed "queued in net-2.6"
 linux-2.6: pending (2.6.26-12) [bugfix/all/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch]
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8) [bugfix/all/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch]
 2.6.26-lenny-security: pending (2.6.26-12) [bugfix/all/atm-duplicate-listen-on-socket-corrupts-the-vcc-table.patch]
 2.6.15-dapper-security:

Modified: active/CVE-2008-5182
===================================================================
--- active/CVE-2008-5182	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-5182	2008-12-15 22:38:45 UTC (rev 1281)
@@ -6,7 +6,7 @@
 Bugs:
 upstream:
 linux-2.6: pending (2.6.26-12) [bugfix/all/inotify-watch-removal-umount-races.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/inotify-watch-removal-umount-races.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/inotify-watch-removal-umount-races.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.7) [bugfix/all/inotify-watch-removal-umount-races.patch]
 2.6.26-lenny-security: pending (2.6.26-12) [bugfix/all/inotify-watch-removal-umount-races.patch]
 2.6.15-dapper-security:

Modified: active/CVE-2008-5300
===================================================================
--- active/CVE-2008-5300	2008-12-15 21:30:37 UTC (rev 1280)
+++ active/CVE-2008-5300	2008-12-15 22:38:45 UTC (rev 1281)
@@ -9,7 +9,7 @@
 Bugs:
 upstream:
 linux-2.6: pending (2.6.26-12) [bugfix/all/net-unix-gc-fix-soft-lockups-oom-issues.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-23etch1) [bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.7) [bugfix/net-unix-gc-fix-soft-lockups-oom-issues.patch]
 2.6.26-lenny-security: pending (2.6.26-12) [bugfix/all/net-unix-gc-fix-soft-lockups-oom-issues.patch]
 2.6.15-dapper-security:




More information about the kernel-sec-discuss mailing list