[kernel-sec-discuss] r1516 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Oct 19 17:12:33 UTC 2009


Author: jmm
Date: 2009-10-19 17:12:33 +0000 (Mon, 19 Oct 2009)
New Revision: 1516

Modified:
   active/CVE-2008-1514
   active/CVE-2008-5033
   active/CVE-2008-5395
   active/CVE-2009-0835
   active/CVE-2009-1265
   active/CVE-2009-3280
Log:
more upstream/sid fixes


Modified: active/CVE-2008-1514
===================================================================
--- active/CVE-2008-1514	2009-10-19 17:09:20 UTC (rev 1515)
+++ active/CVE-2008-1514	2009-10-19 17:12:33 UTC (rev 1516)
@@ -8,7 +8,7 @@
 Ubuntu-Description:
 Notes:
 Bugs:
-upstream:
+upstream: released (2.6.27)
 linux-2.6: released (2.6.26-8) [bugfix/s390/prevent-ptrace-padding-area-read-write-in-31-bit-mode.patch]
 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/prevent-ptrace-padding-area-readwrite-in-32bit-mode.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.6) [bugfix/prevent-ptrace-padding-area-readwrite-in-32bit-mode.patch]

Modified: active/CVE-2008-5033
===================================================================
--- active/CVE-2008-5033	2009-10-19 17:09:20 UTC (rev 1515)
+++ active/CVE-2008-5033	2009-10-19 17:12:33 UTC (rev 1516)
@@ -6,7 +6,7 @@
 Ubuntu-Description:
 Notes:
 Bugs:
-upstream:
+upstream: released (2.6.28)
 linux-2.6: released (2.6.26-11) [bugfix/all/tvaudio-treble-bass-control-oops.patch]
 2.6.18-etch-security: N/A
 2.6.24-etch-security: N/A

Modified: active/CVE-2008-5395
===================================================================
--- active/CVE-2008-5395	2009-10-19 17:09:20 UTC (rev 1515)
+++ active/CVE-2008-5395	2009-10-19 17:12:33 UTC (rev 1516)
@@ -8,7 +8,7 @@
 Ubuntu-Description:
 Notes:
 Bugs:
-upstream:
+upstream: released (2.6.28)
 linux-2.6: released (2.6.26-13) [bugfix/parisc/userspace-unwind-crash.patch]
 2.6.18-etch-security: released (2.6.18.dfsg.1-24etch1) [bugfix/hppa/userspace-unwind-crash.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.8etch1) [bugfix/hppa/userspace-unwind-crash.patch]

Modified: active/CVE-2009-0835
===================================================================
--- active/CVE-2009-0835	2009-10-19 17:09:20 UTC (rev 1515)
+++ active/CVE-2009-0835	2009-10-19 17:12:33 UTC (rev 1516)
@@ -24,7 +24,7 @@
  dannf> agreed
 Bugs:
 upstream: released (2.6.28.8, 2.6.29) [1ab4bad21786384ff68dc6576d021acd4e42d8ce, 5b1017404aea6d2e552e991b3fd814d839e9cd67]
-linux-2.6: (2.6.29-1)
+linux-2.6: released (2.6.29-1)
 2.6.18-etch-security: N/A
 2.6.24-etch-security: N/A
 2.6.26-lenny-security: released (2.6.26-15lenny1) [bugfix/all/seccomp-fix-32+64-syscall-hole.patch]

Modified: active/CVE-2009-1265
===================================================================
--- active/CVE-2009-1265	2009-10-19 17:09:20 UTC (rev 1515)
+++ active/CVE-2009-1265	2009-10-19 17:12:33 UTC (rev 1516)
@@ -5,8 +5,8 @@
 Ubuntu-Description:
 Notes:
 Bugs:
-upstream: 
-linux-2.6: released (2.6.30-rc1) [83e0bbcbe2145f160fbaa109b0439dae7f4a38a9]
+upstream: released (2.6.30-rc1) [83e0bbcbe2145f160fbaa109b0439dae7f4a38a9]
+linux-2.6: released (2.6.30-1)
 2.6.18-etch-security: released (2.6.18.dfsg.1-24etch1) [bugfix/all/af_rose+x25-sanity-check-the-max-user-frame-size.patch]
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.8etch1) [bugfix/all/af_rose+x25-sanity-check-the-max-user-frame-size.patch]
 2.6.26-lenny-security: released (2.6.26-15lenny1) [bugfix/all/af_rose+x25-sanity-check-the-max-user-frame-size.patch]

Modified: active/CVE-2009-3280
===================================================================
--- active/CVE-2009-3280	2009-10-19 17:09:20 UTC (rev 1515)
+++ active/CVE-2009-3280	2009-10-19 17:12:33 UTC (rev 1516)
@@ -5,7 +5,7 @@
 Ubuntu-Description:
 Notes:
 Bugs:
-upstream: pending (2.6.32-rc1) [fcc6cb0c13555e78c2d47257b6d1b5e59b0c419a]
+upstream: released (2.6.32-rc1, 2.6.30.8) [fcc6cb0c13555e78c2d47257b6d1b5e59b0c419a]
 linux-2.6: pending (2.6.31-1)
 2.6.18-etch-security: N/A "vulnerable code not present"
 2.6.24-etch-security: N/A "vulnerable code not present"




More information about the kernel-sec-discuss mailing list