[kernel-sec-discuss] r1324 - active
dannf at alioth.debian.org
dannf at alioth.debian.org
Sat Apr 4 21:42:32 UTC 2009
Author: dannf
Date: 2009-04-04 21:42:32 +0000 (Sat, 04 Apr 2009)
New Revision: 1324
Modified:
active/CVE-2009-0835
active/CVE-2009-0859
active/CVE-2009-1046
Log:
update debian and upstream status
Modified: active/CVE-2009-0835
===================================================================
--- active/CVE-2009-0835 2009-04-04 17:19:18 UTC (rev 1323)
+++ active/CVE-2009-0835 2009-04-04 21:42:32 UTC (rev 1324)
@@ -21,12 +21,13 @@
jmm> CONFIG_SECCOMP has only been enabled in 2.6.26. Since it's ultra-obscure
jmm> and mostly unused anyway, we can likely mark in N/A for 2.6.18 and 2.6.24
jmm> Dann, what do you think?
+ dannf> agreed
Bugs:
upstream:
linux-2.6: needed
-2.6.18-etch-security:
-2.6.24-etch-security:
-2.6.26-lenny-security:
+2.6.18-etch-security: N/A
+2.6.24-etch-security: N/A
+2.6.26-lenny-security: pending (2.6.26-15lenny1) [bugfix/all/seccomp-fix-32+64-syscall-hole.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
Modified: active/CVE-2009-0859
===================================================================
--- active/CVE-2009-0859 2009-04-04 17:19:18 UTC (rev 1323)
+++ active/CVE-2009-0859 2009-04-04 21:42:32 UTC (rev 1324)
@@ -20,11 +20,11 @@
jmm> for locally modified configs and even for that I fail to
jmm> see why anyone would run a kernel w/o CONFIG_SHMEM?
Bugs:
-upstream:
-linux-2.6:
+upstream: released (2.6.29-rc4)
+linux-2.6: released (2.6.29-1)
2.6.18-etch-security:
2.6.24-etch-security:
-2.6.26-lenny-security:
+2.6.26-lenny-security: pending (2.6.26-15lenny1) [bugfix/all/shm-fix-shmctl(SHM_INFO)-lockup-without-CONFIG_SHMEM.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
Modified: active/CVE-2009-1046
===================================================================
--- active/CVE-2009-1046 2009-04-04 17:19:18 UTC (rev 1323)
+++ active/CVE-2009-1046 2009-04-04 21:42:32 UTC (rev 1324)
@@ -17,11 +17,11 @@
Ubuntu-Description:
Notes:
Bugs:
-upstream: released (2.6.28.4)
+upstream: released (2.6.28.4, 2.5.29-rc4)
linux-2.6: released (2.6.29-1)
2.6.18-etch-security:
2.6.24-etch-security:
-2.6.26-lenny-security:
+2.6.26-lenny-security: pending (2.6.26-15lenny1) [bugfix/all/fix-off-by-2-error-in-console-selection.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
More information about the kernel-sec-discuss
mailing list