[kernel-sec-discuss] r1579 - active
Moritz Muehlenhoff
jmm at alioth.debian.org
Sat Nov 7 17:24:09 UTC 2009
Author: jmm
Date: 2009-11-07 17:24:09 +0000 (Sat, 07 Nov 2009)
New Revision: 1579
Modified:
active/CVE-2009-2691
active/CVE-2009-2695
active/CVE-2009-3043
active/CVE-2009-3228
active/CVE-2009-3234
active/CVE-2009-3280
active/CVE-2009-3288
Log:
2.6.31 uploaded to unstable
Modified: active/CVE-2009-2691
===================================================================
--- active/CVE-2009-2691 2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-2691 2009-11-07 17:24:09 UTC (rev 1579)
@@ -10,7 +10,7 @@
construct that didn't exist until after 2.6.27
Bugs:
upstream: released (2.6.31-rc6) [13f0fea, 00f89d2, 704b836]
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
2.6.18-etch-security: ignored (2.6.18.dfsg.1-24etch4) "needs port"
2.6.24-etch-security:
2.6.26-lenny-security: ignored (2.6.26-19) "needs port"
Modified: active/CVE-2009-2695
===================================================================
--- active/CVE-2009-2695 2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-2695 2009-11-07 17:24:09 UTC (rev 1579)
@@ -15,7 +15,7 @@
Notes:
Bugs:
upstream: released (2.6.31-rc7)
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
2.6.18-etch-security:
2.6.24-etch-security:
2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/security-use-mmap_min_addr-independently-of-security-models.patch, bugfix/all/selinux-call-cap_file_mmap-in-selinux_file_mmap.patch, bugfix/all/capabilities-move-cap_file_mmap-to-commoncap.c.patch, bugfix/all/security-seperate-lsm-specific-mmap_min_addr.patch, bugfix/all/security-define-round_hint_to_min-when-CONFIG_SECURITY-is-off.patch]
Modified: active/CVE-2009-3043
===================================================================
--- active/CVE-2009-3043 2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-3043 2009-11-07 17:24:09 UTC (rev 1579)
@@ -15,7 +15,7 @@
Introduced in commits c65c9bc3 and c8d50041.
Bugs:
upstream: released (2.6.31) [5c58ceff103d8a654f24769bb1baaf84a841b0cc]
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
2.6.18-etch-security: N/A "introduced in 2.6.31-rc1"
2.6.24-etch-security: N/A "introduced in 2.6.31-rc1"
2.6.26-lenny-security: N/A "introduced in 2.6.31-rc1"
Modified: active/CVE-2009-3228
===================================================================
--- active/CVE-2009-3228 2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-3228 2009-11-07 17:24:09 UTC (rev 1579)
@@ -21,7 +21,7 @@
Notes:
Bugs:
upstream: released (2.6.31)
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
2.6.18-etch-security:
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch1) [bugfix/all/tc-fix-pad-leak.patch]
2.6.26-lenny-security: pending (2.6.26-19lenny2) [bugfix/all/tc-fix-pad-leak.patch]
Modified: active/CVE-2009-3234
===================================================================
--- active/CVE-2009-3234 2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-3234 2009-11-07 17:24:09 UTC (rev 1579)
@@ -10,7 +10,7 @@
brad spengler has working exploit code for this one, so high-urgency
Bugs:
upstream: released (2.6.31.1) [986ddf533c1dd6852196182084aefe1ca9eda34e], pending (2.6.32-rc2) [b3e62e3]
-linux-2.6: 2.6.31-1
+linux-2.6: released (2.6.31-1)
2.6.18-etch-security: N/A "vulnerable code not present"
2.6.24-etch-security: N/A "vulnerable code not present"
2.6.26-lenny-security: N/A "vulnerable code not present"
Modified: active/CVE-2009-3280
===================================================================
--- active/CVE-2009-3280 2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-3280 2009-11-07 17:24:09 UTC (rev 1579)
@@ -6,7 +6,7 @@
Notes:
Bugs:
upstream: released (2.6.32-rc1, 2.6.30.8) [fcc6cb0c13555e78c2d47257b6d1b5e59b0c419a]
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
2.6.18-etch-security: N/A "vulnerable code not present"
2.6.24-etch-security: N/A "vulnerable code not present"
2.6.26-lenny-security: N/A "vulnerable code not present"
Modified: active/CVE-2009-3288
===================================================================
--- active/CVE-2009-3288 2009-11-06 15:09:00 UTC (rev 1578)
+++ active/CVE-2009-3288 2009-11-07 17:24:09 UTC (rev 1579)
@@ -13,7 +13,7 @@
jmm> e71044ee2efa4792e21d243b03d49006db66aec9
Bugs:
upstream: released (2.6.31.1)
-linux-2.6: pending (2.6.31-1)
+linux-2.6: released (2.6.31-1)
2.6.18-etch-security: N/A "Introduced by upstream commit 10db10d1 in v2.6.28-rc1.
2.6.24-etch-security: N/A "Introduced by upstream commit 10db10d1 in v2.6.28-rc1.
2.6.26-lenny-security: N/A "Introduced by upstream commit 10db10d1 in v2.6.28-rc1.
More information about the kernel-sec-discuss
mailing list