[kernel-sec-discuss] r1548 - active
Dann Frazier
dannf at alioth.debian.org
Fri Oct 23 15:19:22 UTC 2009
Author: dannf
Date: 2009-10-23 15:19:20 +0000 (Fri, 23 Oct 2009)
New Revision: 1548
Modified:
active/CVE-2009-2695
active/CVE-2009-2903
active/CVE-2009-2908
active/CVE-2009-2909
active/CVE-2009-2910
active/CVE-2009-3001
active/CVE-2009-3002
active/CVE-2009-3286
active/CVE-2009-3290
active/CVE-2009-3613
Log:
status updates, including the release of 2.6.26-19lenny1
Modified: active/CVE-2009-2695
===================================================================
--- active/CVE-2009-2695 2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-2695 2009-10-23 15:19:20 UTC (rev 1548)
@@ -18,7 +18,7 @@
linux-2.6: pending (2.6.31-1)
2.6.18-etch-security:
2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/security-use-mmap_min_addr-independently-of-security-models.patch, bugfix/all/selinux-call-cap_file_mmap-in-selinux_file_mmap.patch, bugfix/all/capabilities-move-cap_file_mmap-to-commoncap.c.patch, bugfix/all/security-seperate-lsm-specific-mmap_min_addr.patch, bugfix/all/security-define-round_hint_to_min-when-CONFIG_SECURITY-is-off.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/security-use-mmap_min_addr-independently-of-security-models.patch, bugfix/all/selinux-call-cap_file_mmap-in-selinux_file_mmap.patch, bugfix/all/capabilities-move-cap_file_mmap-to-commoncap.c.patch, bugfix/all/security-seperate-lsm-specific-mmap_min_addr.patch, bugfix/all/security-define-round_hint_to_min-when-CONFIG_SECURITY-is-off.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
Modified: active/CVE-2009-2903
===================================================================
--- active/CVE-2009-2903 2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-2903 2009-10-23 15:19:20 UTC (rev 1548)
@@ -18,11 +18,11 @@
Ubuntu-Description:
Notes:
Bugs:
-upstream: pending [ffcfb8db540ff879c2a85bf7e404954281443414]
-linux-2.6:
+upstream: released (2.6.32-rc1) [ffcfb8db540ff879c2a85bf7e404954281443414]
+linux-2.6: pending (2.6.32-1)
2.6.18-etch-security:
2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/appletalk-use-correct-returns-for-atalk_rcv.patch, bugfix/all/appletalk-fix-skb-leak-when-ipddp-interface-is-not-loaded.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/appletalk-use-correct-returns-for-atalk_rcv.patch, bugfix/all/appletalk-fix-skb-leak-when-ipddp-interface-is-not-loaded.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
Modified: active/CVE-2009-2908
===================================================================
--- active/CVE-2009-2908 2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-2908 2009-10-23 15:19:20 UTC (rev 1548)
@@ -12,8 +12,8 @@
Notes:
jmm> Introduced in 2.6.19
Bugs:
-upstream: released (2.6.31.2) [afc2b6932f48f200736d3e36ad66fee0ec733136], pending (2.6.32-rc3) [9c2d2056647790c5034d722bd24e9d913ebca73c]
-linux-2.6: needed
+upstream: released (2.6.31.2) [afc2b6932f48f200736d3e36ad66fee0ec733136], released (2.6.32-rc3) [9c2d2056647790c5034d722bd24e9d913ebca73c]
+linux-2.6: pending (2.6.31-1)
2.6.18-etch-security: N/A
2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/ecryptfs-prevent-lower-dentry-from-going-negative-during-unlink.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/ecryptfs-prevent-lower-dentry-from-going-negative-during-unlink.patch]
Modified: active/CVE-2009-2909
===================================================================
--- active/CVE-2009-2909 2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-2909 2009-10-23 15:19:20 UTC (rev 1548)
@@ -8,7 +8,7 @@
Notes:
Bugs:
upstream: released (2.6.30.9) [80a761c59bfe01de1deeb5fc66f5b7fbb3e1bfcf], pending (2.6.32-rc3) [b7058842c940ad2c08dd829b21e5c92ebe3b8758]
-linux-2.6:
+linux-2.6: pending (2.6.30-9) [bugfix/all/stable/2.6.30.9.patch]
2.6.18-etch-security:
2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/net-ax25-fix-signed-comparison-in-the-sockopt-handler.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/net-ax25-fix-signed-comparison-in-the-sockopt-handler.patch]
Modified: active/CVE-2009-2910
===================================================================
--- active/CVE-2009-2910 2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-2910 2009-10-23 15:19:20 UTC (rev 1548)
@@ -10,7 +10,7 @@
other badness
Bugs:
upstream: released (2.6.31.4) [ee39c2f3e1e667314c018c9fd1e205c97e746bd2], released (2.6.32-rc4) [24e35800cdc4350fc34e2bed37b608a9e13ab3b6]
-linux-2.6: needed
+linux-2.6: released (2.6.31-1~experimental.2) [bugfix/all/stable/2.6.31.4.patch]
2.6.18-etch-security:
2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/x86/x86-64-slightly-stream-line-32-bit-syscall-entry-code.patch, bugfix/x86/don-t-leak-64-bit-kernel-register-values-to-32-bit-processes.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/x86/x86-64-slightly-stream-line-32-bit-syscall-entry-code.patch, bugfix/x86/don-t-leak-64-bit-kernel-register-values-to-32-bit-processes.patch]
Modified: active/CVE-2009-3001
===================================================================
--- active/CVE-2009-3001 2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-3001 2009-10-23 15:19:20 UTC (rev 1548)
@@ -12,11 +12,11 @@
Notes:
gilbert> minor info leak, so not very urgent
Bugs:
-upstream: released (2.6.31) [28e9fc592cb8c7a43e4d3147b38be6032a0e81bc]
-linux-2.6: pending (2.6.31-1)
+upstream: released (2.6.31-rc8) [28e9fc592cb8c7a43e4d3147b38be6032a0e81bc]
+linux-2.6: released (2.6.31-1~experimental.1)
2.6.18-etch-security: needed
2.6.24-etch-security: needed
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/net-llc-zero-sockaddr_llc-struct.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/net-llc-zero-sockaddr_llc-struct.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
Modified: active/CVE-2009-3002
===================================================================
--- active/CVE-2009-3002 2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-3002 2009-10-23 15:19:20 UTC (rev 1548)
@@ -18,11 +18,11 @@
Notes:
gilbert> these are just minor info leaks, so not really very urgent
Bugs:
-upstream: released (2.6.31) [09384dfc76e526c3993c09c42e016372dc9dd22c,17ac2e9c58b69a1e25460a568eae1b0dc0188c25,80922bbb12a105f858a8f0abb879cb4302d0ecaa,e84b90ae5eb3c112d1f208964df1d8156a538289,f6b97b29513950bfbf621a83d85b6f86b39ec8db]
-linux-2.6: pending (2.6.31-1)
+upstream: released (2.6.31-rc7) [09384dfc76e526c3993c09c42e016372dc9dd22c,17ac2e9c58b69a1e25460a568eae1b0dc0188c25,80922bbb12a105f858a8f0abb879cb4302d0ecaa,e84b90ae5eb3c112d1f208964df1d8156a538289,f6b97b29513950bfbf621a83d85b6f86b39ec8db]
+linux-2.6: released (2.6.30-7) [bugfix/all/stable/2.6.30.6.patch]
2.6.18-etch-security:
2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/irda-fix-irda_getname-leak.patch, bugfix/all/rose-fix-rose_getname-leak.patch, bugfix/all/econet-fix-econet_getname-leak.patch, bugfix/all/can-fix-raw_getname-leak.patch, bugfix/all/netrom-fix-nr_getname-leak.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/irda-fix-irda_getname-leak.patch, bugfix/all/rose-fix-rose_getname-leak.patch, bugfix/all/econet-fix-econet_getname-leak.patch, bugfix/all/can-fix-raw_getname-leak.patch, bugfix/all/netrom-fix-nr_getname-leak.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
Modified: active/CVE-2009-3286
===================================================================
--- active/CVE-2009-3286 2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-3286 2009-10-23 15:19:20 UTC (rev 1548)
@@ -16,7 +16,7 @@
linux-2.6: released (2.6.30-1)
2.6.18-etch-security: needed "also needs some 2.6.19 backports"
2.6.24-etch-security: needed
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/nfsd4-de-union-iattr-and-verf.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/nfsd4-de-union-iattr-and-verf.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
Modified: active/CVE-2009-3290
===================================================================
--- active/CVE-2009-3290 2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-3290 2009-10-23 15:19:20 UTC (rev 1548)
@@ -19,11 +19,11 @@
brad spengler has already developed working exploit code for this, so this is
high-urgency
Bugs:
-upstream: released (2.6.31) [07708c4af1346ab1521b26a202f438366b7bcffd]
-linux-2.6: pending (2.6.31-1)
+upstream: released (2.6.32-rc1) [07708c4af1346ab1521b26a202f438366b7bcffd]
+linux-2.6: pending (2.6.30-9) [bugfix/all/stable/2.6.30.9.patch]
2.6.18-etch-security: N/A "introduced in 2.6.25"
2.6.24-etch-security: N/A "introduced in 2.6.25"
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/x86/kvm-disallow-hypercalls-for-guest-callers-in-rings-gt-0.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/x86/kvm-disallow-hypercalls-for-guest-callers-in-rings-gt-0.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
Modified: active/CVE-2009-3613
===================================================================
--- active/CVE-2009-3613 2009-10-23 02:49:42 UTC (rev 1547)
+++ active/CVE-2009-3613 2009-10-23 15:19:20 UTC (rev 1548)
@@ -11,4 +11,4 @@
linux-2.6: released (2.6.29-1)
2.6.18-etch-security:
2.6.24-etch-security:
-2.6.26-lenny-security: pending (2.6.26-19lenny1) [bugfix/all/r8169-use-hardware-auto-padding.patch]
+2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/all/r8169-use-hardware-auto-padding.patch]
More information about the kernel-sec-discuss
mailing list