[kernel-sec-discuss] r1566 - active

Dann Frazier dannf at alioth.debian.org
Wed Nov 4 21:29:55 UTC 2009


Author: dannf
Date: 2009-11-04 21:29:55 +0000 (Wed, 04 Nov 2009)
New Revision: 1566

Modified:
   active/CVE-2009-2909
   active/CVE-2009-2910
   active/CVE-2009-3001
   active/CVE-2009-3002
   active/CVE-2009-3228
   active/CVE-2009-3238
   active/CVE-2009-3286
   active/CVE-2009-3612
   active/CVE-2009-3613
   active/CVE-2009-3620
   active/CVE-2009-3621
Log:
status updates

Modified: active/CVE-2009-2909
===================================================================
--- active/CVE-2009-2909	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-2909	2009-11-04 21:29:55 UTC (rev 1566)
@@ -10,5 +10,5 @@
 upstream: released (2.6.30.9) [80a761c59bfe01de1deeb5fc66f5b7fbb3e1bfcf], pending (2.6.32-rc3) [b7058842c940ad2c08dd829b21e5c92ebe3b8758]
 linux-2.6: pending (2.6.30-9) [bugfix/all/stable/2.6.30.9.patch]
 2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch4) [bugfix/all/net-ax25-fix-signed-comparison-in-the-sockopt-handler.patch]
 2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/net-ax25-fix-signed-comparison-in-the-sockopt-handler.patch]

Modified: active/CVE-2009-2910
===================================================================
--- active/CVE-2009-2910	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-2910	2009-11-04 21:29:55 UTC (rev 1566)
@@ -12,5 +12,5 @@
 upstream: released (2.6.31.4) [ee39c2f3e1e667314c018c9fd1e205c97e746bd2], released (2.6.32-rc4) [24e35800cdc4350fc34e2bed37b608a9e13ab3b6]
 linux-2.6: released (2.6.31-1~experimental.2) [bugfix/all/stable/2.6.31.4.patch]
 2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch4) [bugfix/x86-64-slightly-stream-line-32-bit-syscall-entry-code.patch, bugfix/don-t-leak-64-bit-kernel-register-values-to-32-bit-processes.patch]
 2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/x86/x86-64-slightly-stream-line-32-bit-syscall-entry-code.patch, bugfix/x86/don-t-leak-64-bit-kernel-register-values-to-32-bit-processes.patch]

Modified: active/CVE-2009-3001
===================================================================
--- active/CVE-2009-3001	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-3001	2009-11-04 21:29:55 UTC (rev 1566)
@@ -15,7 +15,7 @@
 upstream: released (2.6.31-rc8) [28e9fc592cb8c7a43e4d3147b38be6032a0e81bc]
 linux-2.6: released (2.6.31-1~experimental.1)
 2.6.18-etch-security: needed
-2.6.24-etch-security: needed
+2.6.24-etch-security: released (2.6.24-6~etchnhalf.8etch4) [bugfix/all/net-llc-zero-sockaddr_llc-struct.patch]
 2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/net-llc-zero-sockaddr_llc-struct.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:

Modified: active/CVE-2009-3002
===================================================================
--- active/CVE-2009-3002	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-3002	2009-11-04 21:29:55 UTC (rev 1566)
@@ -21,7 +21,7 @@
 upstream: released (2.6.31-rc7) [09384dfc76e526c3993c09c42e016372dc9dd22c,17ac2e9c58b69a1e25460a568eae1b0dc0188c25,80922bbb12a105f858a8f0abb879cb4302d0ecaa,e84b90ae5eb3c112d1f208964df1d8156a538289,f6b97b29513950bfbf621a83d85b6f86b39ec8db]
 linux-2.6: released (2.6.30-7) [bugfix/all/stable/2.6.30.6.patch]
 2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch4) [bugfix/all/irda-fix-irda_getname-leak.patch, bugfix/all/rose-fix-rose_getname-leak.patch, bugfix/all/econet-fix-econet_getname-leak.patch, bugfix/all/netrom-fix-nr_getname-leak.patch]
 2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/irda-fix-irda_getname-leak.patch, bugfix/all/rose-fix-rose_getname-leak.patch, bugfix/all/econet-fix-econet_getname-leak.patch, bugfix/all/can-fix-raw_getname-leak.patch, bugfix/all/netrom-fix-nr_getname-leak.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:

Modified: active/CVE-2009-3228
===================================================================
--- active/CVE-2009-3228	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-3228	2009-11-04 21:29:55 UTC (rev 1566)
@@ -23,5 +23,5 @@
 upstream: released (2.6.31)
 linux-2.6: pending (2.6.31-1)
 2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch4) [bugfix/all/tc-fix-pad-leak.patch]
 2.6.26-lenny-security: pending (2.6.26-19lenny2) [bugfix/all/tc-fix-pad-leak.patch]

Modified: active/CVE-2009-3238
===================================================================
--- active/CVE-2009-3238	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-3238	2009-11-04 21:29:55 UTC (rev 1566)
@@ -16,5 +16,5 @@
 upstream: released (2.6.30) [8a0a9bd4db63bc45e3017bedeafbd88d0eb84d02]
 linux-2.6: released (2.6.30-1)
 2.6.18-etch-security: needed
-2.6.24-etch-security: needed
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch4) [bugfix/all/random-make-get_random_int-more-random.patch]
 2.6.26-lenny-security: pending (2.6.26-19lenny2) [bugfix/all/random-make-get_random_int-more-random.patch]

Modified: active/CVE-2009-3286
===================================================================
--- active/CVE-2009-3286	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-3286	2009-11-04 21:29:55 UTC (rev 1566)
@@ -15,7 +15,7 @@
 upstream: released (2.6.30-rc1) [79fb54ab]
 linux-2.6: released (2.6.30-1)
 2.6.18-etch-security: needed "also needs some 2.6.19 backports"
-2.6.24-etch-security: needed
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch4) [bugfix/all/nfsd4-de-union-iattr-and-verf.patch]
 2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/nfsd4-de-union-iattr-and-verf.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:

Modified: active/CVE-2009-3612
===================================================================
--- active/CVE-2009-3612	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-3612	2009-11-04 21:29:55 UTC (rev 1566)
@@ -13,5 +13,5 @@
 upstream: released (2.6.32-rc5) [ad61df918c44316940404891d5082c63e79c256a]
 linux-2.6: needed
 2.6.18-etch-security: needed
-2.6.24-etch-security: needed
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch4) [bugfix/all/netlink-fix-typo-in-initialization.patch]
 2.6.26-lenny-security: pending (2.6.26-19lenny2) [bugfix/all/netlink-fix-typo-in-initialization.patch]

Modified: active/CVE-2009-3613
===================================================================
--- active/CVE-2009-3613	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-3613	2009-11-04 21:29:55 UTC (rev 1566)
@@ -10,5 +10,5 @@
 upstream: released (2.6.29) [a866bbf, 97d477a]
 linux-2.6: released (2.6.29-1)
 2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch4) [bugfix/all/r8169-balance-pci_map-pci_unmap-pair.patch, bugfix/all/r8169-use-hardware-auto-padding.patch]
 2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/r8169-use-hardware-auto-padding.patch]

Modified: active/CVE-2009-3620
===================================================================
--- active/CVE-2009-3620	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-3620	2009-11-04 21:29:55 UTC (rev 1566)
@@ -10,5 +10,5 @@
 upstream:
 linux-2.6:
 2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch4) [bugfix/all/drm+r128-Add-test-for-init-to-all-reqd-ioctls.patch]
 2.6.26-lenny-security: pending (2.6.26-19lenny2) [bugfix/all/drm+r128-Add-test-for-init-to-all-reqd-ioctls.patch]

Modified: active/CVE-2009-3621
===================================================================
--- active/CVE-2009-3621	2009-11-04 20:05:25 UTC (rev 1565)
+++ active/CVE-2009-3621	2009-11-04 21:29:55 UTC (rev 1566)
@@ -9,5 +9,5 @@
 upstream: pending (2.6.32-rc6) [77238f2b942b38ab4e7f3aced44084493e4a8675]
 linux-2.6:
 2.6.18-etch-security:
-2.6.24-etch-security:
+2.6.24-etch-security: pending (2.6.24-6~etchnhalf.8etch4) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch]
 2.6.26-lenny-security: pending (2.6.26-19lenny2) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch]




More information about the kernel-sec-discuss mailing list