[kernel-sec-discuss] r1243 - active

dannf at alioth.debian.org dannf at alioth.debian.org
Tue Oct 14 16:03:24 UTC 2008


Author: dannf
Date: 2008-10-14 16:03:23 +0000 (Tue, 14 Oct 2008)
New Revision: 1243

Modified:
   active/CVE-2007-6716
   active/CVE-2008-0598
   active/CVE-2008-1514
   active/CVE-2008-3276
   active/CVE-2008-3525
   active/CVE-2008-3686
   active/CVE-2008-3833
   active/CVE-2008-3911
   active/CVE-2008-3915
   active/CVE-2008-4210
   active/CVE-2008-4302
   active/CVE-2008-4410
Log:
pending->released transitions

Modified: active/CVE-2007-6716
===================================================================
--- active/CVE-2007-6716	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2007-6716	2008-10-14 16:03:23 UTC (rev 1243)
@@ -15,7 +15,7 @@
 Bugs: 
 upstream: released (2.6.23)
 linux-2.6: released (2.6.23-1)
-2.6.18-etch-security: pending (2.6.18.dfsg.1-22etch3) [bugfix/dio-zero-struct-dio-with-kzalloc-instead-of-manually.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/dio-zero-struct-dio-with-kzalloc-instead-of-manually.patch]
 2.6.24-etch-security: N/A
 2.6.26-lenny-security: N/A
 2.6.15-dapper-security: 

Modified: active/CVE-2008-0598
===================================================================
--- active/CVE-2008-0598	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-0598	2008-10-14 16:03:23 UTC (rev 1243)
@@ -7,7 +7,7 @@
 Ubuntu-Description: 
 Notes: 
 Bugs: 490910
-upstream: pending (2.6.27-rc1)
+upstream: released (2.6.27-rc1)
 linux-2.6: released (2.6.26-4) [bugfix/x86-add-copy_user_handle_tail.patch, bugfix/x86-fix-copy_user.patch]
 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch2) [bugfix/x86-add-copy_user_handle_tail.patch, bugfix/x86-fix-copy_user.patch, bugfix/x86-wrong-register-was-used-in-align-macro.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/x86-add-copy_user_handle_tail.patch, bugfix/x86-fix-copy_user.patch, bugfix/x86-wrong-register-was-used-in-align-macro.patch]

Modified: active/CVE-2008-1514
===================================================================
--- active/CVE-2008-1514	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-1514	2008-10-14 16:03:23 UTC (rev 1243)
@@ -9,10 +9,10 @@
 Notes:
 Bugs:
 upstream:
-linux-2.6: pending (2.6.26-8) [bugfix/s390/prevent-ptrace-padding-area-read-write-in-31-bit-mode.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-22etch3) [bugfix/prevent-ptrace-padding-area-readwrite-in-32bit-mode.patch]
+linux-2.6: released (2.6.26-8) [bugfix/s390/prevent-ptrace-padding-area-read-write-in-31-bit-mode.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/prevent-ptrace-padding-area-readwrite-in-32bit-mode.patch]
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.6) [bugfix/prevent-ptrace-padding-area-readwrite-in-32bit-mode.patch]
-2.6.26-lenny-security: pending (2.6.26-8) [bugfix/s390/prevent-ptrace-padding-area-read-write-in-31-bit-mode.patch]
+2.6.26-lenny-security: released (2.6.26-8) [bugfix/s390/prevent-ptrace-padding-area-read-write-in-31-bit-mode.patch]
 2.6.15-dapper-security:
 2.6.20-feisty-security:
 2.6.22-gutsy-security:

Modified: active/CVE-2008-3276
===================================================================
--- active/CVE-2008-3276	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-3276	2008-10-14 16:03:23 UTC (rev 1243)
@@ -7,7 +7,7 @@
 Bugs: 
 upstream: released (2.6.26.3)
 linux-2.6: released (2.6.26-4)
-2.6.18-etch-security: pending (2.6.18.dfsg.1-22etch3) [bugfix/dccp-change-l-r-must-have-at-least-one-byte-in-the-dccpsf_val-field.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/dccp-change-l-r-must-have-at-least-one-byte-in-the-dccpsf_val-field.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/dccp-change-l-r-must-have-at-least-one-byte-in-the-dccpsf_val-field.patch]
 2.6.26-lenny-security: released (2.6.26-4) [bugfix/all/stable/2.6.26.3.patch]
 2.6.15-dapper-security: 

Modified: active/CVE-2008-3525
===================================================================
--- active/CVE-2008-3525	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-3525	2008-10-14 16:03:23 UTC (rev 1243)
@@ -6,10 +6,10 @@
 Notes:
 Bugs:
 upstream:
-linux-2.6: pending (2.6.26-7) [bugfix/wan-sbni_ioctl-cap-checks.patch]
-2.6.18-etch-security: pending (2.6.18.dfsg.1-22etch3) [bugfix/wan-sbni_ioctl-cap-checks.patch]
+linux-2.6: released (2.6.26-7) [bugfix/wan-sbni_ioctl-cap-checks.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/wan-sbni_ioctl-cap-checks.patch]
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.6) [bugfix/wan-sbni_ioctl-cap-checks.patch]
-2.6.26-lenny-security: pending (2.6.26-7) [bugfix/wan-sbni_ioctl-cap-checks.patch]
+2.6.26-lenny-security: released (2.6.26-7) [bugfix/wan-sbni_ioctl-cap-checks.patch]
 2.6.15-dapper-security:
 2.6.20-feisty-security:
 2.6.22-gutsy-security:

Modified: active/CVE-2008-3686
===================================================================
--- active/CVE-2008-3686	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-3686	2008-10-14 16:03:23 UTC (rev 1243)
@@ -5,11 +5,11 @@
 Ubuntu-Description:
 Notes:
 Bugs:
-upstream: released (2.6.26.4), pending (2.6.27)
-linux-2.6: pending (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
+upstream: released (2.6.26.4), released (2.6.27)
+linux-2.6: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
 2.6.18-etch-security: N/A
 2.6.24-etch-security: N/A
-2.6.26-lenny-security: pending (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
+2.6.26-lenny-security: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
 2.6.15-dapper-security:
 2.6.20-feisty-security:
 2.6.22-gutsy-security:

Modified: active/CVE-2008-3833
===================================================================
--- active/CVE-2008-3833	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-3833	2008-10-14 16:03:23 UTC (rev 1243)
@@ -8,7 +8,7 @@
 Bugs:
 upstream: released (2.6.19)
 linux-2.6: released (2.6.19-1)
-2.6.18-etch-security: pending (2.6.18.dfsg.1-22etch3) [bugfix/remove-SUID-when-splicing-into-an-inode.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/remove-SUID-when-splicing-into-an-inode.patch]
 2.6.24-etch-security: N/A
 2.6.26-lenny-security: N/A
 2.6.15-dapper-security:

Modified: active/CVE-2008-3911
===================================================================
--- active/CVE-2008-3911	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-3911	2008-10-14 16:03:23 UTC (rev 1243)
@@ -13,11 +13,11 @@
 Ubuntu-Description: 
 Notes: 
 Bugs: 
-upstream: released (2.6.26.4), pending (2.6.27)
-linux-2.6: pending (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
+upstream: released (2.6.26.4), released (2.6.27)
+linux-2.6: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
 2.6.18-etch-security: N/A
 2.6.24-etch-security: N/A
-2.6.26-lenny-security: pending (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
+2.6.26-lenny-security: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
 2.6.15-dapper-security: 
 2.6.20-feisty-security: 
 2.6.22-gutsy-security: 

Modified: active/CVE-2008-3915
===================================================================
--- active/CVE-2008-3915	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-3915	2008-10-14 16:03:23 UTC (rev 1243)
@@ -5,11 +5,11 @@
 Ubuntu-Description: 
 Notes: 
 Bugs: 
-upstream: released (2.6.26.4), pending (2.6.27)
-linux-2.6: pending (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
+upstream: released (2.6.26.4, 2.6.27)
+linux-2.6: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
 2.6.18-etch-security: N/A
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/nfsd-fix-buffer-overrun-decoding-nfsv4-acl.patch]
-2.6.26-lenny-security: pending (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
+2.6.26-lenny-security: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch]
 2.6.15-dapper-security: 
 2.6.20-feisty-security: 
 2.6.22-gutsy-security: 

Modified: active/CVE-2008-4210
===================================================================
--- active/CVE-2008-4210	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-4210	2008-10-14 16:03:23 UTC (rev 1243)
@@ -9,7 +9,7 @@
 Bugs:
 upstream: released (2.6.22)
 linux-2.6: N/A
-2.6.18-etch-security: pending (2.6.18.dfsg.1-22etch3) [bugfix/lockless-helpers-for-remove_suid.patch, bugfix/open-allows-sgid-in-sgid-directory.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/lockless-helpers-for-remove_suid.patch, bugfix/open-allows-sgid-in-sgid-directory.patch]
 2.6.24-etch-security: N/A
 2.6.26-lenny-security: N/A
 2.6.15-dapper-security:

Modified: active/CVE-2008-4302
===================================================================
--- active/CVE-2008-4302	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-4302	2008-10-14 16:03:23 UTC (rev 1243)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (2.6.23)
 linux-2.6: released (2.6.23-1)
-2.6.18-etch-security: pending (2.6.18.dfsg.1-22etch3) [bugfix/splice-fix-bad-unlock_page-in-error-case.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/splice-fix-bad-unlock_page-in-error-case.patch]
 2.6.24-etch-security: N/A
 2.6.26-lenny-security: N/A
 2.6.15-dapper-security:

Modified: active/CVE-2008-4410
===================================================================
--- active/CVE-2008-4410	2008-10-13 20:19:01 UTC (rev 1242)
+++ active/CVE-2008-4410	2008-10-14 16:03:23 UTC (rev 1243)
@@ -6,11 +6,11 @@
 Ubuntu-Description:
 Notes:
 Bugs:
-upstream: pending (2.6.27)
-linux-2.6: pending (2.6.26-8) [bugfix/x86-fix-broken-LDT-access-in-VMI.patch]
+upstream: released (2.6.27)
+linux-2.6: released (2.6.26-8) [bugfix/x86-fix-broken-LDT-access-in-VMI.patch]
 2.6.18-etch-security: N/A
 2.6.24-etch-security: N/A
-2.6.26-lenny-security: pending (2.6.26-8) [bugfix/x86-fix-broken-LDT-access-in-VMI.patch]
+2.6.26-lenny-security: released (2.6.26-8) [bugfix/x86-fix-broken-LDT-access-in-VMI.patch]
 2.6.15-dapper-security:
 2.6.20-feisty-security:
 2.6.22-gutsy-security:




More information about the kernel-sec-discuss mailing list