[kernel-sec-discuss] r1339 - active
Dann Frazier
dannf at alioth.debian.org
Mon Apr 13 05:58:35 UTC 2009
Author: dannf
Date: 2009-04-13 05:58:35 +0000 (Mon, 13 Apr 2009)
New Revision: 1339
Modified:
active/CVE-2007-5907
active/CVE-2009-0028
active/CVE-2009-0675
active/CVE-2009-0676
active/CVE-2009-0834
active/CVE-2009-0859
active/CVE-2009-1046
active/CVE-2009-1242
active/CVE-2009-1265
Log:
debian updates
Modified: active/CVE-2007-5907
===================================================================
--- active/CVE-2007-5907 2009-04-09 04:43:39 UTC (rev 1338)
+++ active/CVE-2007-5907 2009-04-13 05:58:35 UTC (rev 1339)
@@ -5,9 +5,9 @@
Notes:
kees> this is a hypervisor-only issue, and doesn't touch the kernel, AFAICT
Bugs:
-upstream:
-linux-2.6:
-2.6.18-etch-security: needed
+upstream: N/A
+linux-2.6: N/A
+2.6.18-etch-security: N/A
2.6.24-etch-security: N/A
2.6.26-lenny-security: N/A
2.6.15-dapper-security: N/A
Modified: active/CVE-2009-0028
===================================================================
--- active/CVE-2009-0028 2009-04-09 04:43:39 UTC (rev 1338)
+++ active/CVE-2009-0028 2009-04-13 05:58:35 UTC (rev 1339)
@@ -15,7 +15,7 @@
Bugs:
upstream: released (2.6.29-rc8)
linux-2.6: released (2.6.29-1)
-2.6.18-etch-security: needed
+2.6.18-etch-security: pending (2.6.18.dfsg.1-24etch1) [bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch]
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch1) [bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch]
2.6.26-lenny-security: pending (2.6.26-15lenny1) [bugfix/all/copy_process-fix-CLONE_PARENT-and-parent_exec_id-interaction.patch]
2.6.15-dapper-security:
Modified: active/CVE-2009-0675
===================================================================
--- active/CVE-2009-0675 2009-04-09 04:43:39 UTC (rev 1338)
+++ active/CVE-2009-0675 2009-04-13 05:58:35 UTC (rev 1339)
@@ -20,7 +20,7 @@
Bugs:
upstream: released (2.6.28.6, 2.6.29-rc4)
linux-2.6: released (2.6.29-1)
-2.6.18-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-24etch1) [bugfix/all/skfp-fix-inverted-cap-logic.patch]
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch1) [bugfix/all/skfp-fix-inverted-cap-logic.patch]
2.6.26-lenny-security: released (2.6.26-13lenny2) [bugfix/all/skfp-fix-inverted-cap-logic.patch]
2.6.15-dapper-security:
Modified: active/CVE-2009-0676
===================================================================
--- active/CVE-2009-0676 2009-04-09 04:43:39 UTC (rev 1338)
+++ active/CVE-2009-0676 2009-04-13 05:58:35 UTC (rev 1339)
@@ -18,7 +18,7 @@
Bugs:
upstream: released (2.6.28.6, 2.6.29-rc5)
linux-2.6: released (2.6.29-1)
-2.6.18-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-24etch1) [bugfix/all/net-SO_BSDCOMPAT-leak.patch, bugfix/all/net-SO_BSDCOMPAT-leak-2.patch]
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch1) [bugfix/all/net-SO_BSDCOMPAT-leak.patch, bugfix/all/net-SO_BSDCOMPAT-leak-2.patch]
2.6.26-lenny-security: released (2.6.26-13lenny1) [bugfix/all/net-SO_BSDCOMPAT-leak.patch, bugfix/all/net-SO_BSDCOMPAT-leak-2.patch]
2.6.15-dapper-security:
Modified: active/CVE-2009-0834
===================================================================
--- active/CVE-2009-0834 2009-04-09 04:43:39 UTC (rev 1338)
+++ active/CVE-2009-0834 2009-04-13 05:58:35 UTC (rev 1339)
@@ -17,7 +17,7 @@
Bugs:
upstream: released (2.6.27.20, 2.6.28.8, 2.6.29-rc7)
linux-2.6: released (2.6.29-1)
-2.6.18-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-24etch1) [bugfix/syscall-audit-fix-32+64-syscall-hole.patch]
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch1) [bugfix/syscall-audit-fix-32+64-syscall-hole.patch]
2.6.26-lenny-security: pending (2.6.26-15lenny1) [bugfix/x86/syscall-audit-fix-32+64-syscall-hole.patch]
2.6.15-dapper-security:
Modified: active/CVE-2009-0859
===================================================================
--- active/CVE-2009-0859 2009-04-09 04:43:39 UTC (rev 1338)
+++ active/CVE-2009-0859 2009-04-13 05:58:35 UTC (rev 1339)
@@ -22,7 +22,7 @@
Bugs:
upstream: released (2.6.29-rc4)
linux-2.6: released (2.6.29-1)
-2.6.18-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-24etch1) [bugfix/all/shm-fix-shmctl-SHM_INFO-lockup-without-CONFIG_SHMEM.patch]
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch1) [bugfix/all/shm-fix-shmctl-SHM_INFO-lockup-without-CONFIG_SHMEM.patch]
2.6.26-lenny-security: pending (2.6.26-15lenny1) [bugfix/all/shm-fix-shmctl-SHM_INFO-lockup-without-CONFIG_SHMEM.patch]
2.6.15-dapper-security:
Modified: active/CVE-2009-1046
===================================================================
--- active/CVE-2009-1046 2009-04-09 04:43:39 UTC (rev 1338)
+++ active/CVE-2009-1046 2009-04-13 05:58:35 UTC (rev 1339)
@@ -19,7 +19,7 @@
Bugs:
upstream: released (2.6.28.4, 2.5.29-rc4)
linux-2.6: released (2.6.29-1)
-2.6.18-etch-security:
+2.6.18-etch-security: N/A "Appears to have been introduced by 759448f in 2.6.23-rc1"
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch1) [bugfix/all/fix-off-by-2-error-in-console-selection.patch]
2.6.26-lenny-security: pending (2.6.26-15lenny1) [bugfix/all/fix-off-by-2-error-in-console-selection.patch]
2.6.15-dapper-security:
Modified: active/CVE-2009-1242
===================================================================
--- active/CVE-2009-1242 2009-04-09 04:43:39 UTC (rev 1338)
+++ active/CVE-2009-1242 2009-04-13 05:58:35 UTC (rev 1339)
@@ -19,8 +19,8 @@
Bugs:
upstream: released (2.6.29.1)
linux-2.6: released (2.6.29-2)
-2.6.18-etch-security: needed
-2.6.24-etch-security: needed
+2.6.18-etch-security: N/A "no KVM"
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch1) [bugfix/kvm-vmx-inhibit-EFER-access.patch]
2.6.26-lenny-security: pending (2.6.26-15lenny1) [bugfix/x86/kvm-vmx-inhibit-EFER-access.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
Modified: active/CVE-2009-1265
===================================================================
--- active/CVE-2009-1265 2009-04-09 04:43:39 UTC (rev 1338)
+++ active/CVE-2009-1265 2009-04-13 05:58:35 UTC (rev 1339)
@@ -7,7 +7,7 @@
Bugs:
upstream:
linux-2.6: released (2.6.30-rc1) [83e0bbcbe2145f160fbaa109b0439dae7f4a38a9]
-2.6.18-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-24etch1) [bugfix/all/af_rose+x25-sanity-check-the-max-user-frame-size.patch]
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch1) [bugfix/all/af_rose+x25-sanity-check-the-max-user-frame-size.patch]
2.6.26-lenny-security: pending (2.6.26-15lenny1) [bugfix/all/af_rose+x25-sanity-check-the-max-user-frame-size.patch]
2.6.15-dapper-security:
More information about the kernel-sec-discuss
mailing list