[kernel-sec-discuss] r2093 - active
Moritz Muehlenhoff
jmm at alioth.debian.org
Mon Dec 13 17:35:55 UTC 2010
Author: jmm
Date: 2010-12-13 17:35:53 +0000 (Mon, 13 Dec 2010)
New Revision: 2093
Modified:
active/CVE-2010-0435
active/CVE-2010-2653
active/CVE-2010-3849
Log:
updates
Modified: active/CVE-2010-0435
===================================================================
--- active/CVE-2010-0435 2010-12-13 17:34:53 UTC (rev 2092)
+++ active/CVE-2010-0435 2010-12-13 17:35:53 UTC (rev 2093)
@@ -8,7 +8,7 @@
jmm> The kernel.org version is quite different, though. Maybe it's only exploitable in
jmm> combination with the plethora of KVM patches added by Red Hat?
Bugs:
-upstream:
+upstream: released (2.6.34)
2.6.32-upstream-stable: released (2.6.32.27)
linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
2.6.26-lenny-security:
Modified: active/CVE-2010-2653
===================================================================
--- active/CVE-2010-2653 2010-12-13 17:34:53 UTC (rev 2092)
+++ active/CVE-2010-2653 2010-12-13 17:35:53 UTC (rev 2093)
@@ -6,7 +6,7 @@
Notes:
dannf> upstream fix uses tty kref counting infrastructure, which didn't
dannf> get added until 2.6.28
- jmm> Submitted for 2.6.32.x stable
+ jmm> Submitted for 2.6.32.x stable, repinged 2010-12-12.
Bugs:
upstream: released (2.6.34-rc2) [e74d098c]
2.6.32-upstream-stable: needed
Modified: active/CVE-2010-3849
===================================================================
--- active/CVE-2010-3849 2010-12-13 17:34:53 UTC (rev 2092)
+++ active/CVE-2010-3849 2010-12-13 17:35:53 UTC (rev 2093)
@@ -5,7 +5,7 @@
Notes:
Bugs:
upstream: released (2.6.37-rc4) [fa0e846494792e722d817b9d3d625a4ef4896c96]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: released (2.6.32.27)
linux-2.6: released (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
2.6.26-lenny-security: released (2.6.26-26lenny1) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
More information about the kernel-sec-discuss
mailing list