[kernel-sec-discuss] r1579 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Sat Nov 7 17:24:09 UTC 2009


Author: jmm
Date: 2009-11-07 17:24:09 +0000 (Sat, 07 Nov 2009)
New Revision: 1579

Modified:
   active/CVE-2009-2691
   active/CVE-2009-2695
   active/CVE-2009-3043
   active/CVE-2009-3228
   active/CVE-2009-3234
   active/CVE-2009-3280
   active/CVE-2009-3288
Log:
2.6.31 uploaded to unstable


Modified: active/CVE-2009-2691
===================================================================
--- active/CVE-2009-2691	2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-2691	2009-11-07 17:24:09 UTC (rev 1579)
@@ -10,7 +10,7 @@
          construct that didn't exist until after 2.6.27
 Bugs:
 upstream: released (2.6.31-rc6) [13f0fea, 00f89d2, 704b836]
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
 2.6.18-etch-security: ignored (2.6.18.dfsg.1-24etch4) "needs port"
 2.6.24-etch-security:
 2.6.26-lenny-security: ignored (2.6.26-19) "needs port"

Modified: active/CVE-2009-2695
===================================================================
--- active/CVE-2009-2695	2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-2695	2009-11-07 17:24:09 UTC (rev 1579)
@@ -15,7 +15,7 @@
 Notes:
 Bugs:
 upstream: released (2.6.31-rc7)
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
 2.6.18-etch-security:
 2.6.24-etch-security:
 2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/security-use-mmap_min_addr-independently-of-security-models.patch, bugfix/all/selinux-call-cap_file_mmap-in-selinux_file_mmap.patch, bugfix/all/capabilities-move-cap_file_mmap-to-commoncap.c.patch, bugfix/all/security-seperate-lsm-specific-mmap_min_addr.patch, bugfix/all/security-define-round_hint_to_min-when-CONFIG_SECURITY-is-off.patch]

Modified: active/CVE-2009-3043
===================================================================
--- active/CVE-2009-3043	2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-3043	2009-11-07 17:24:09 UTC (rev 1579)
@@ -15,7 +15,7 @@
  Introduced in commits c65c9bc3 and c8d50041.
 Bugs:
 upstream: released (2.6.31) [5c58ceff103d8a654f24769bb1baaf84a841b0cc]
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
 2.6.18-etch-security: N/A "introduced in 2.6.31-rc1"
 2.6.24-etch-security: N/A "introduced in 2.6.31-rc1"
 2.6.26-lenny-security: N/A "introduced in 2.6.31-rc1"

Modified: active/CVE-2009-3228
===================================================================
--- active/CVE-2009-3228	2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-3228	2009-11-07 17:24:09 UTC (rev 1579)
@@ -21,7 +21,7 @@
 Notes:
 Bugs:
 upstream: released (2.6.31)
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
 2.6.18-etch-security:
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch1) [bugfix/all/tc-fix-pad-leak.patch]
 2.6.26-lenny-security: pending (2.6.26-19lenny2) [bugfix/all/tc-fix-pad-leak.patch]

Modified: active/CVE-2009-3234
===================================================================
--- active/CVE-2009-3234	2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-3234	2009-11-07 17:24:09 UTC (rev 1579)
@@ -10,7 +10,7 @@
  brad spengler has working exploit code for this one, so high-urgency
 Bugs:
 upstream: released (2.6.31.1) [986ddf533c1dd6852196182084aefe1ca9eda34e], pending (2.6.32-rc2) [b3e62e3]
-linux-2.6: 2.6.31-1
+linux-2.6: released (2.6.31-1)
 2.6.18-etch-security: N/A "vulnerable code not present"
 2.6.24-etch-security: N/A "vulnerable code not present"
 2.6.26-lenny-security: N/A "vulnerable code not present"

Modified: active/CVE-2009-3280
===================================================================
--- active/CVE-2009-3280	2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-3280	2009-11-07 17:24:09 UTC (rev 1579)
@@ -6,7 +6,7 @@
 Notes:
 Bugs:
 upstream: released (2.6.32-rc1, 2.6.30.8) [fcc6cb0c13555e78c2d47257b6d1b5e59b0c419a]
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
 2.6.18-etch-security: N/A "vulnerable code not present"
 2.6.24-etch-security: N/A "vulnerable code not present"
 2.6.26-lenny-security: N/A "vulnerable code not present"

Modified: active/CVE-2009-3288
===================================================================
--- active/CVE-2009-3288	2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-3288	2009-11-07 17:24:09 UTC (rev 1579)
@@ -13,7 +13,7 @@
  jmm> e71044ee2efa4792e21d243b03d49006db66aec9
 Bugs:
 upstream: released (2.6.31.1)
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
 2.6.18-etch-security: N/A "Introduced by upstream commit 10db10d1 in v2.6.28-rc1.
 2.6.24-etch-security: N/A "Introduced by upstream commit 10db10d1 in v2.6.28-rc1.
 2.6.26-lenny-security: N/A "Introduced by upstream commit 10db10d1 in v2.6.28-rc1.




More information about the kernel-sec-discuss mailing list