[kernel-sec-discuss] r1609 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Nov 16 23:49:33 UTC 2009


Author: jmm
Date: 2009-11-16 23:49:33 +0000 (Mon, 16 Nov 2009)
New Revision: 1609

Modified:
   active/CVE-2009-3290
Log:
fixed in sid


Modified: active/CVE-2009-3290
===================================================================
--- active/CVE-2009-3290	2009-11-16 23:49:19 UTC (rev 1608)
+++ active/CVE-2009-3290	2009-11-16 23:49:33 UTC (rev 1609)
@@ -9,7 +9,8 @@
  from guest ring 0. This may still be relaxed on a per-hypercall base in 
  the future once required."
  .
- This was introduced in v2.6.25-rc1, and fixed in 2.6.31.
+ This was introduced in v2.6.25-rc1, and fixed in 2.6.31
+ jmm> The oss-security posting is wrong, this was fixed in 2.6.31-1
 References:
  http://www.openwall.com/lists/oss-security/2009/09/18/1
  http://patchwork.kernel.org/patch/38926/
@@ -20,11 +21,7 @@
  high-urgency
 Bugs:
 upstream: released (2.6.32-rc1) [07708c4af1346ab1521b26a202f438366b7bcffd]
-linux-2.6: pending (2.6.30-9) [bugfix/all/stable/2.6.30.9.patch]
+linux-2.6: released (2.6.31-1)
 2.6.18-etch-security: N/A "introduced in 2.6.25"
 2.6.24-etch-security: N/A "introduced in 2.6.25"
 2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/x86/kvm-disallow-hypercalls-for-guest-callers-in-rings-gt-0.patch]
-2.6.15-dapper-security:
-2.6.22-gutsy-security:
-2.6.24-hardy-security:
-2.6.27-intrepid-security:




More information about the kernel-sec-discuss mailing list