[kernel-sec-discuss] r1731 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Sun Feb 14 21:05:57 UTC 2010


Author: jmm
Date: 2010-02-14 21:05:53 +0000 (Sun, 14 Feb 2010)
New Revision: 1731

Modified:
   active/CVE-2007-2480
   active/CVE-2009-1072
   active/CVE-2009-1758
   active/CVE-2009-2910
Log:
record end of life for Etch


Modified: active/CVE-2007-2480
===================================================================
--- active/CVE-2007-2480	2010-02-13 01:37:02 UTC (rev 1730)
+++ active/CVE-2007-2480	2010-02-14 21:05:53 UTC (rev 1731)
@@ -13,7 +13,7 @@
 Bugs: 
 upstream: released (2.6.22)
 linux-2.6: released (2.6.22-1)
-2.6.18-etch-security: ignored (2.6.18.dfsg.1-13etch6) "needs backport"
+2.6.18-etch-security: ignored (EOL)
 2.6.24-etch-security: N/A
 2.6.26-lenny-security: N/A
 2.6.8-sarge-security: ignored (2.6.8-17sarge1) "needs backport"

Modified: active/CVE-2009-1072
===================================================================
--- active/CVE-2009-1072	2010-02-13 01:37:02 UTC (rev 1730)
+++ active/CVE-2009-1072	2010-02-14 21:05:53 UTC (rev 1731)
@@ -14,8 +14,8 @@
 Bugs:
 upstream: released (2.6.28.9, 2.6.29)
 linux-2.6: released (2.6.29-1)
-2.6.18-etch-security: "http://www.openwall.com/lists/oss-security/2009/03/25/2 suggests this doesn't effect 2.6.24 or earlier - but it looks like the code may have just moved from fs/nfsd/auth.c?" 
-2.6.24-etch-security: "http://www.openwall.com/lists/oss-security/2009/03/25/2 suggests this doesn't effect 2.6.24 or earlier - but it looks like the code may have just moved from fs/nfsd/auth.c?"
+2.6.18-etch-security: ignored (EOL)
+2.6.24-etch-security: ignored (EOL)
 2.6.26-lenny-security: released (2.6.26-15lenny1) [bugfix/all/nfsd-drop-CAP_MKNOD-for-non-root.patch]
 2.6.15-dapper-security:
 2.6.22-gutsy-security:

Modified: active/CVE-2009-1758
===================================================================
--- active/CVE-2009-1758	2010-02-13 01:37:02 UTC (rev 1730)
+++ active/CVE-2009-1758	2010-02-14 21:05:53 UTC (rev 1731)
@@ -11,7 +11,7 @@
  536148
 upstream: N/A "not in upstream xen code"
 linux-2.6: released (2.6.28-1) "bug in dom0 code, which has been removed since debian 2.6.28 kernel"
-2.6.18-etch-security: ignored (2.6.18.dfsg.1-24etch4) "needs port"
+2.6.18-etch-security: ignored (EOL)
 2.6.24-etch-security: N/A "no xen support"
 2.6.26-lenny-security: released (2.6.26-15lenny3) [features/all/xen/i386-hypervisor_callback-adjustments.patch]
 2.6.15-dapper-security:

Modified: active/CVE-2009-2910
===================================================================
--- active/CVE-2009-2910	2010-02-13 01:37:02 UTC (rev 1730)
+++ active/CVE-2009-2910	2010-02-14 21:05:53 UTC (rev 1731)
@@ -11,6 +11,6 @@
 Bugs:
 upstream: released (2.6.31.4) [ee39c2f3e1e667314c018c9fd1e205c97e746bd2], released (2.6.32-rc4) [24e35800cdc4350fc34e2bed37b608a9e13ab3b6]
 linux-2.6: released (2.6.31-1~experimental.2) [bugfix/all/stable/2.6.31.4.patch]
-2.6.18-etch-security: ignored (2.6.18.dfsg.1-26etch1) "needs port"
+2.6.18-etch-security: ignored (EOL)
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch1) [bugfix/x86-64-slightly-stream-line-32-bit-syscall-entry-code.patch, bugfix/don-t-leak-64-bit-kernel-register-values-to-32-bit-processes.patch]
 2.6.26-lenny-security: released (2.6.26-19lenny1) [bugfix/x86/x86-64-slightly-stream-line-32-bit-syscall-entry-code.patch, bugfix/x86/don-t-leak-64-bit-kernel-register-values-to-32-bit-processes.patch]




More information about the kernel-sec-discuss mailing list