[kernel-sec-discuss] r1602 - active

Michael Gilbert gilbert-guest at alioth.debian.org
Mon Nov 16 21:36:21 UTC 2009


Author: gilbert-guest
Date: 2009-11-16 21:36:21 +0000 (Mon, 16 Nov 2009)
New Revision: 1602

Modified:
   active/CVE-2009-2584
   active/CVE-2009-3547
   active/CVE-2009-3621
   active/CVE-2009-3640
Log:
more updates

Modified: active/CVE-2009-2584
===================================================================
--- active/CVE-2009-2584	2009-11-16 21:02:27 UTC (rev 1601)
+++ active/CVE-2009-2584	2009-11-16 21:36:21 UTC (rev 1602)
@@ -16,7 +16,7 @@
    http://lkml.org/lkml/2009/11/4/538
 Bugs:
 upstream: released (2.6.32-rc7) [d39b7dd1dcbf394a1cb897457c862dafe9a20ac5], released (2.6.31.6) [42d7bdfc3320039bb9310703d6475a62f5c74772]
-linux-2.6: 3.6.31-2
+linux-2.6: released (2.6.31-2)
 2.6.18-etch-security: N/A "code not present"
 2.6.24-etch-security: N/A "code not present"
 2.6.26-lenny-security: N/A "code not present"

Modified: active/CVE-2009-3547
===================================================================
--- active/CVE-2009-3547	2009-11-16 21:02:27 UTC (rev 1601)
+++ active/CVE-2009-3547	2009-11-16 21:36:21 UTC (rev 1602)
@@ -15,8 +15,8 @@
  - May be not be exploitable on debian due to mmap_min_addr protections?
 jmm> ad3960243e55320d74195fb85c975e0a8cc4466c
 Bugs:
-pstream: released (2.6.31.6)
-linux-2.6: released (2.6.31-2)
+upstream: released (2.6.32-rc6) [ad396024]
+linux-2.6: needed
 2.6.18-etch-security: released (2.6.18.dfsg.1-26etch1) [bugfix/all/fs-pipe-null-pointer-dereference.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch1) [bugfix/all/fs-pipe-null-pointer-dereference.patch]
 2.6.26-lenny-security: released (2.6.26-19lenny2) [bugfix/all/fs-pipe-null-pointer-dereference.patch]

Modified: active/CVE-2009-3621
===================================================================
--- active/CVE-2009-3621	2009-11-16 21:02:27 UTC (rev 1601)
+++ active/CVE-2009-3621	2009-11-16 21:36:21 UTC (rev 1602)
@@ -7,7 +7,7 @@
 Notes:
 Bugs:
 upstream: released (2.6.32-rc6) [77238f2b942b38ab4e7f3aced44084493e4a8675], released (2.6.31.6) [027590f053888a282d09f420a39ad08a17dda76f]
-linux-2.6: 2.6.31-2
+linux-2.6: released (2.6.31-2)
 2.6.18-etch-security: released (2.6.18.dfsg.1-26etch1) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch1) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch]
 2.6.26-lenny-security: released (2.6.26-19lenny2) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch]

Modified: active/CVE-2009-3640
===================================================================
--- active/CVE-2009-3640	2009-11-16 21:02:27 UTC (rev 1601)
+++ active/CVE-2009-3640	2009-11-16 21:36:21 UTC (rev 1602)
@@ -7,8 +7,8 @@
 Notes:
  kvm support introduced in 2.6.25
 Bugs:
-upstream: released (2.6.32-rc1) [88c808fd42b53a7e01a2ac3253ef31fef74cb5af]
-linux-2.6: needed
+upstream: released (2.6.32-rc1) [88c808fd42b53a7e01a2ac3253ef31fef74cb5af], released (2.6.31.2) [c3443b436a0767cbc0d4ab405f8fa13fb34bd56c]
+linux-2.6: released (2.6.31-1)
 2.6.18-etch-security: N/A "no kvm"
 2.6.24-etch-security: N/A "no kvm"
 2.6.26-lenny-security: ignored (2.6.26-19lenny2) "unclear if affected, code has changed a lot"




More information about the kernel-sec-discuss mailing list