[kernel-sec-discuss] r1261 - active
dannf at alioth.debian.org
dannf at alioth.debian.org
Thu Nov 13 20:47:31 UTC 2008
Author: dannf
Date: 2008-11-13 20:47:31 +0000 (Thu, 13 Nov 2008)
New Revision: 1261
Modified:
active/CVE-2008-3528
active/CVE-2008-4576
active/CVE-2008-4933
active/CVE-2008-4934
active/CVE-2008-5025
active/CVE-2008-5029
Log:
debian status updates
Modified: active/CVE-2008-3528
===================================================================
--- active/CVE-2008-3528 2008-11-10 18:29:56 UTC (rev 1260)
+++ active/CVE-2008-3528 2008-11-13 20:47:31 UTC (rev 1261)
@@ -14,7 +14,7 @@
Bugs:
upstream:
linux-2.6:
-2.6.18-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/ext2-avoid-corrupted-directory-printk-floods.patch, bugfix/ext3-avoid-corrupted-directory-printk-floods.patch]
2.6.24-etch-security:
2.6.26-lenny-security:
2.6.15-dapper-security:
Modified: active/CVE-2008-4576
===================================================================
--- active/CVE-2008-4576 2008-11-10 18:29:56 UTC (rev 1260)
+++ active/CVE-2008-4576 2008-11-13 20:47:31 UTC (rev 1261)
@@ -8,7 +8,7 @@
Bugs:
upstream:
linux-2.6: released (2.6.26-9) [bugfix/all/stable/2.6.26.6.patch]
-2.6.18-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch]
2.6.24-etch-security:
2.6.26-lenny-security: released (2.6.26-9) [bugfix/all/stable/2.6.26.6.patch]
2.6.15-dapper-security:
Modified: active/CVE-2008-4933
===================================================================
--- active/CVE-2008-4933 2008-11-10 18:29:56 UTC (rev 1260)
+++ active/CVE-2008-4933 2008-11-13 20:47:31 UTC (rev 1261)
@@ -8,7 +8,7 @@
Bugs:
upstream:
linux-2.6:
-2.6.18-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch]
2.6.24-etch-security:
2.6.26-lenny-security:
2.6.15-dapper-security:
Modified: active/CVE-2008-4934
===================================================================
--- active/CVE-2008-4934 2008-11-10 18:29:56 UTC (rev 1260)
+++ active/CVE-2008-4934 2008-11-13 20:47:31 UTC (rev 1261)
@@ -8,7 +8,7 @@
Bugs:
upstream:
linux-2.6:
-2.6.18-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/hfsplus-check_read_mapping_page-return-value.patch]
2.6.24-etch-security:
2.6.26-lenny-security:
2.6.15-dapper-security:
Modified: active/CVE-2008-5025
===================================================================
--- active/CVE-2008-5025 2008-11-10 18:29:56 UTC (rev 1260)
+++ active/CVE-2008-5025 2008-11-13 20:47:31 UTC (rev 1261)
@@ -8,7 +8,7 @@
Bugs:
upstream:
linux-2.6:
-2.6.18-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/hfs-fix-namelength-memory-corruption.patch]
2.6.24-etch-security:
2.6.26-lenny-security:
2.6.15-dapper-security:
Modified: active/CVE-2008-5029
===================================================================
--- active/CVE-2008-5029 2008-11-10 18:29:56 UTC (rev 1260)
+++ active/CVE-2008-5029 2008-11-13 20:47:31 UTC (rev 1261)
@@ -16,8 +16,8 @@
upstream:
linux-2.6:
2.6.18-etch-security:
-2.6.24-etch-security:
-2.6.26-lenny-security:
+2.6.24-etch-security: needed
+2.6.26-lenny-security: needed
2.6.15-dapper-security:
2.6.20-feisty-security:
2.6.22-gutsy-security:
More information about the kernel-sec-discuss
mailing list