[kernel-sec-discuss] r1548 - active

Dann Frazier dannf at alioth.debian.org
Fri Oct 23 15:19:22 UTC 2009


Author: dannf
Date: 2009-10-23 15:19:20 +0000 (Fri, 23 Oct 2009)
New Revision: 1548

Modified:
   active/CVE-2009-2695
   active/CVE-2009-2903
   active/CVE-2009-2908
   active/CVE-2009-2909
   active/CVE-2009-2910
   active/CVE-2009-3001
   active/CVE-2009-3002
   active/CVE-2009-3286
   active/CVE-2009-3290
   active/CVE-2009-3613
Log:
status updates, including the release of 2.6.26-19lenny1


Modified: active/CVE-2009-2695
===================================================================
--- active/CVE-2009-2695	2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-2695	2009-10-23 15:19:20 UTC (rev 1548)
@@ -18,7 +18,7 @@
 linux-2.6: pending (2.6.31-1)
 2.6.18-etch-security:
 2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/security-use-mmap_min_addr-independently-of-security-models.patch, bugfix/all/selinux-call-cap_file_mmap-in-selinux_file_mmap.patch, bugfix/all/capabilities-move-cap_file_mmap-to-commoncap.c.patch, bugfix/all/security-seperate-lsm-specific-mmap_min_addr.patch, bugfix/all/security-define-round_hint_to_min-when-CONFIG_SECURITY-is-off.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/security-use-mmap_min_addr-independently-of-security-models.patch, bugfix/all/selinux-call-cap_file_mmap-in-selinux_file_mmap.patch, bugfix/all/capabilities-move-cap_file_mmap-to-commoncap.c.patch, bugfix/all/security-seperate-lsm-specific-mmap_min_addr.patch, bugfix/all/security-define-round_hint_to_min-when-CONFIG_SECURITY-is-off.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:
 2.6.24-hardy-security:

Modified: active/CVE-2009-2903
===================================================================
--- active/CVE-2009-2903	2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-2903	2009-10-23 15:19:20 UTC (rev 1548)
@@ -18,11 +18,11 @@
 Ubuntu-Description:
 Notes:
 Bugs:
-upstream: pending [ffcfb8db540ff879c2a85bf7e404954281443414]
-linux-2.6:
+upstream: released (2.6.32-rc1) [ffcfb8db540ff879c2a85bf7e404954281443414]
+linux-2.6: pending (2.6.32-1)
 2.6.18-etch-security:
 2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/appletalk-use-correct-returns-for-atalk_rcv.patch, bugfix/all/appletalk-fix-skb-leak-when-ipddp-interface-is-not-loaded.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/appletalk-use-correct-returns-for-atalk_rcv.patch, bugfix/all/appletalk-fix-skb-leak-when-ipddp-interface-is-not-loaded.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:
 2.6.24-hardy-security:

Modified: active/CVE-2009-2908
===================================================================
--- active/CVE-2009-2908	2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-2908	2009-10-23 15:19:20 UTC (rev 1548)
@@ -12,8 +12,8 @@
 Notes:
  jmm> Introduced in 2.6.19
 Bugs:
-upstream: released (2.6.31.2) [afc2b6932f48f200736d3e36ad66fee0ec733136], pending (2.6.32-rc3) [9c2d2056647790c5034d722bd24e9d913ebca73c]
-linux-2.6: needed
+upstream: released (2.6.31.2) [afc2b6932f48f200736d3e36ad66fee0ec733136], released (2.6.32-rc3) [9c2d2056647790c5034d722bd24e9d913ebca73c]
+linux-2.6: pending (2.6.31-1)
 2.6.18-etch-security: N/A
 2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/ecryptfs-prevent-lower-dentry-from-going-negative-during-unlink.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/ecryptfs-prevent-lower-dentry-from-going-negative-during-unlink.patch]

Modified: active/CVE-2009-2909
===================================================================
--- active/CVE-2009-2909	2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-2909	2009-10-23 15:19:20 UTC (rev 1548)
@@ -8,7 +8,7 @@
 Notes:
 Bugs:
 upstream: released (2.6.30.9) [80a761c59bfe01de1deeb5fc66f5b7fbb3e1bfcf], pending (2.6.32-rc3) [b7058842c940ad2c08dd829b21e5c92ebe3b8758]
-linux-2.6:
+linux-2.6: pending (2.6.30-9) [bugfix/all/stable/2.6.30.9.patch]
 2.6.18-etch-security:
 2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/net-ax25-fix-signed-comparison-in-the-sockopt-handler.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/net-ax25-fix-signed-comparison-in-the-sockopt-handler.patch]

Modified: active/CVE-2009-2910
===================================================================
--- active/CVE-2009-2910	2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-2910	2009-10-23 15:19:20 UTC (rev 1548)
@@ -10,7 +10,7 @@
  other badness
 Bugs:
 upstream: released (2.6.31.4) [ee39c2f3e1e667314c018c9fd1e205c97e746bd2], released (2.6.32-rc4) [24e35800cdc4350fc34e2bed37b608a9e13ab3b6]
-linux-2.6: needed
+linux-2.6: released (2.6.31-1~experimental.2) [bugfix/all/stable/2.6.31.4.patch]
 2.6.18-etch-security:
 2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/x86/x86-64-slightly-stream-line-32-bit-syscall-entry-code.patch, bugfix/x86/don-t-leak-64-bit-kernel-register-values-to-32-bit-processes.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/x86/x86-64-slightly-stream-line-32-bit-syscall-entry-code.patch, bugfix/x86/don-t-leak-64-bit-kernel-register-values-to-32-bit-processes.patch]

Modified: active/CVE-2009-3001
===================================================================
--- active/CVE-2009-3001	2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-3001	2009-10-23 15:19:20 UTC (rev 1548)
@@ -12,11 +12,11 @@
 Notes:
  gilbert> minor info leak, so not very urgent
 Bugs:
-upstream: released (2.6.31) [28e9fc592cb8c7a43e4d3147b38be6032a0e81bc]
-linux-2.6: pending (2.6.31-1)
+upstream: released (2.6.31-rc8) [28e9fc592cb8c7a43e4d3147b38be6032a0e81bc]
+linux-2.6: released (2.6.31-1~experimental.1)
 2.6.18-etch-security: needed
 2.6.24-etch-security: needed
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/net-llc-zero-sockaddr_llc-struct.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/net-llc-zero-sockaddr_llc-struct.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:
 2.6.24-hardy-security:

Modified: active/CVE-2009-3002
===================================================================
--- active/CVE-2009-3002	2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-3002	2009-10-23 15:19:20 UTC (rev 1548)
@@ -18,11 +18,11 @@
 Notes:
  gilbert> these are just minor info leaks, so not really very urgent
 Bugs:
-upstream: released (2.6.31) [09384dfc76e526c3993c09c42e016372dc9dd22c,17ac2e9c58b69a1e25460a568eae1b0dc0188c25,80922bbb12a105f858a8f0abb879cb4302d0ecaa,e84b90ae5eb3c112d1f208964df1d8156a538289,f6b97b29513950bfbf621a83d85b6f86b39ec8db]
-linux-2.6: pending (2.6.31-1)
+upstream: released (2.6.31-rc7) [09384dfc76e526c3993c09c42e016372dc9dd22c,17ac2e9c58b69a1e25460a568eae1b0dc0188c25,80922bbb12a105f858a8f0abb879cb4302d0ecaa,e84b90ae5eb3c112d1f208964df1d8156a538289,f6b97b29513950bfbf621a83d85b6f86b39ec8db]
+linux-2.6: released (2.6.30-7) [bugfix/all/stable/2.6.30.6.patch]
 2.6.18-etch-security:
 2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/irda-fix-irda_getname-leak.patch, bugfix/all/rose-fix-rose_getname-leak.patch, bugfix/all/econet-fix-econet_getname-leak.patch, bugfix/all/can-fix-raw_getname-leak.patch, bugfix/all/netrom-fix-nr_getname-leak.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/irda-fix-irda_getname-leak.patch, bugfix/all/rose-fix-rose_getname-leak.patch, bugfix/all/econet-fix-econet_getname-leak.patch, bugfix/all/can-fix-raw_getname-leak.patch, bugfix/all/netrom-fix-nr_getname-leak.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:
 2.6.24-hardy-security:

Modified: active/CVE-2009-3286
===================================================================
--- active/CVE-2009-3286	2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-3286	2009-10-23 15:19:20 UTC (rev 1548)
@@ -16,7 +16,7 @@
 linux-2.6: released (2.6.30-1)
 2.6.18-etch-security: needed "also needs some 2.6.19 backports"
 2.6.24-etch-security: needed
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/nfsd4-de-union-iattr-and-verf.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/nfsd4-de-union-iattr-and-verf.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:
 2.6.24-hardy-security:

Modified: active/CVE-2009-3290
===================================================================
--- active/CVE-2009-3290	2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-3290	2009-10-23 15:19:20 UTC (rev 1548)
@@ -19,11 +19,11 @@
  brad spengler has already developed working exploit code for this, so this is 
  high-urgency
 Bugs:
-upstream: released (2.6.31) [07708c4af1346ab1521b26a202f438366b7bcffd]
-linux-2.6: pending (2.6.31-1)
+upstream: released (2.6.32-rc1) [07708c4af1346ab1521b26a202f438366b7bcffd]
+linux-2.6: pending (2.6.30-9) [bugfix/all/stable/2.6.30.9.patch]
 2.6.18-etch-security: N/A "introduced in 2.6.25"
 2.6.24-etch-security: N/A "introduced in 2.6.25"
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/x86/kvm-disallow-hypercalls-for-guest-callers-in-rings-gt-0.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/x86/kvm-disallow-hypercalls-for-guest-callers-in-rings-gt-0.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:
 2.6.24-hardy-security:

Modified: active/CVE-2009-3613
===================================================================
--- active/CVE-2009-3613	2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-3613	2009-10-23 15:19:20 UTC (rev 1548)
@@ -11,4 +11,4 @@
 linux-2.6: released (2.6.29-1)
 2.6.18-etch-security:
 2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/r8169-use-hardware-auto-padding.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/r8169-use-hardware-auto-padding.patch]




More information about the kernel-sec-discuss mailing list