[kernel-sec-discuss] r1293 - active

dannf at alioth.debian.org dannf at alioth.debian.org
Wed Jan 14 06:07:28 UTC 2009


Author: dannf
Date: 2009-01-14 06:07:28 +0000 (Wed, 14 Jan 2009)
New Revision: 1293

Modified:
   active/CVE-2008-4307
   active/CVE-2008-5700
   active/CVE-2008-5701
   active/CVE-2008-5713
   active/CVE-2009-0024
   active/CVE-2009-0065
Log:
debian updates

Modified: active/CVE-2008-4307
===================================================================
--- active/CVE-2008-4307	2009-01-13 18:19:11 UTC (rev 1292)
+++ active/CVE-2008-4307	2009-01-14 06:07:28 UTC (rev 1293)
@@ -6,11 +6,11 @@
 Ubuntu-Description:
 Notes:
 Bugs:
-upstream:
-linux-2.6:
-2.6.18-etch-security:
-2.6.24-etch-security:
-2.6.26-lenny-security:
+upstream: released (2.6.26-rc1)
+linux-2.6: released (2.6.26-1)
+2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch2) [bugfix/all/nfs-remove-buggy-lock-if-signalled-case.patch]
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7etch1) [bugfix/all/nfs-remove-buggy-lock-if-signalled-case.patch]
+2.6.26-lenny-security: released (2.6.26-1)
 2.6.15-dapper-security:
 2.6.22-gutsy-security:
 2.6.24-hardy-security:

Modified: active/CVE-2008-5700
===================================================================
--- active/CVE-2008-5700	2009-01-13 18:19:11 UTC (rev 1292)
+++ active/CVE-2008-5700	2009-01-14 06:07:28 UTC (rev 1293)
@@ -12,8 +12,8 @@
 Bugs:
 upstream: released (2.6.27.9)
 linux-2.6: released (2.6.26-13) [bugfix/enforce-minimum-SG_IO-timeout.patch]
-2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.18-etch-security: N/A "code not present"
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7etch1) [bugfix/all/enforce-minimum-SG_IO-timeout.patch]
 2.6.26-lenny-security: released (2.6.26-13) [bugfix/enforce-minimum-SG_IO-timeout.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:

Modified: active/CVE-2008-5701
===================================================================
--- active/CVE-2008-5701	2009-01-13 18:19:11 UTC (rev 1292)
+++ active/CVE-2008-5701	2009-01-14 06:07:28 UTC (rev 1293)
@@ -14,7 +14,7 @@
 upstream: released (2.6.28)
 linux-2.6: releasd (2.6.26-13) [bugfix/mips/fix-potential-dos.patch]
 2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7etch1) [bugfix/mips/fix-potential-dos.patch]
 2.6.26-lenny-security: released (2.6.26-13) [bugfix/mips/fix-potential-dos.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:

Modified: active/CVE-2008-5713
===================================================================
--- active/CVE-2008-5713	2009-01-13 18:19:11 UTC (rev 1292)
+++ active/CVE-2008-5713	2009-01-14 06:07:28 UTC (rev 1293)
@@ -14,10 +14,10 @@
 Ubuntu-Description:
 Notes:
 Bugs:
-upstream: released (2.6.25-rc9) [2ba2506ca7ca62c56edaa334b0fe61eb5eab6ab0]
+upstream: released (2.6.24.5, 2.6.25-rc9) [2ba2506ca7ca62c56edaa334b0fe61eb5eab6ab0]
 linux-2.6: released (2.6.25-1)
 2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.24-etch-security: released (2.6.24-6~etchnhalf.1) [bugfix/all/stable/2.6.24.5.patch]
 2.6.26-lenny-security: N/A
 2.6.15-dapper-security:
 2.6.22-gutsy-security:

Modified: active/CVE-2009-0024
===================================================================
--- active/CVE-2009-0024	2009-01-13 18:19:11 UTC (rev 1292)
+++ active/CVE-2009-0024	2009-01-14 06:07:28 UTC (rev 1293)
@@ -9,7 +9,7 @@
 linux-2.6: released (2.6.24-4)
 2.6.18-etch-security: N/A
 2.6.24-etch-security: N/A
-2.6.26-lenny-security:
+2.6.26-lenny-security: released (2.6.24-4)
 2.6.15-dapper-security:
 2.6.22-gutsy-security:
 2.6.24-hardy-security:

Modified: active/CVE-2009-0065
===================================================================
--- active/CVE-2009-0065	2009-01-13 18:19:11 UTC (rev 1292)
+++ active/CVE-2009-0065	2009-01-14 06:07:28 UTC (rev 1293)
@@ -9,8 +9,8 @@
 Bugs:
 upstream:
 linux-2.6: pending (2.6.26-14) [bugfix/all/sctp-avoid-memory-overflow.patch]
-2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch2) [bugfix/all/sctp-avoid-memory-overflow.patch]
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7etch1) [bugfix/all/sctp-avoid-memory-overflow.patch]
 2.6.26-lenny-security: pending (2.6.26-14) [bugfix/all/sctp-avoid-memory-overflow.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:




More information about the kernel-sec-discuss mailing list