[kernel-sec-discuss] r1736 - active

Dann Frazier dannf at alioth.debian.org
Sun Feb 14 21:56:00 UTC 2010


Author: dannf
Date: 2010-02-14 21:56:00 +0000 (Sun, 14 Feb 2010)
New Revision: 1736

Modified:
   active/CVE-2009-3620
   active/CVE-2009-3726
   active/CVE-2009-4005
   active/CVE-2009-4020
   active/CVE-2009-4021
   active/CVE-2009-4536
   active/CVE-2009-4538
   active/CVE-2010-0003
Log:
un-EOL these - one more 2.6.18 update is planned


Modified: active/CVE-2009-3620
===================================================================
--- active/CVE-2009-3620	2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-3620	2010-02-14 21:56:00 UTC (rev 1736)
@@ -9,6 +9,6 @@
 Bugs:
 upstream: released (2.6.32-rc1) [7dc482dfeeeefcfd000d4271c4626937406756d7]
 linux-2.6: released (2.6.32-1) 
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security: needed
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch1) [bugfix/all/drm+r128-Add-test-for-init-to-all-reqd-ioctls.patch]
 2.6.26-lenny-security: released (2.6.26-19lenny2) [bugfix/all/drm+r128-Add-test-for-init-to-all-reqd-ioctls.patch]

Modified: active/CVE-2009-3726
===================================================================
--- active/CVE-2009-3726	2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-3726	2010-02-14 21:56:00 UTC (rev 1736)
@@ -8,6 +8,6 @@
 Bugs:
 upstream: released (2.6.31) [d953126a28f97ec965d23c69fd5795854c048f30]
 linux-2.6: released (2.6.31-1)
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security:
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/nfsv4-buggy-server-oops.patch]
 2.6.26-lenny-security: released (2.6.26-21) [bugfix/all/nfsv4-buggy-server-oops.patch]

Modified: active/CVE-2009-4005
===================================================================
--- active/CVE-2009-4005	2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-4005	2010-02-14 21:56:00 UTC (rev 1736)
@@ -8,7 +8,7 @@
 upstream: released (2.6.32-rc7) [286e633e]
 2.6.31-upstream-stable: N/A
 linux-2.6: released (2.6.32-1)
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security: needed
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/isdn-hfc_usb-fix-read-buffer-overflow.patch]
 2.6.26-lenny-security: released (2.6.26-21) [bugfix/all/isdn-hfc_usb-fix-read-buffer-overflow.patch]
 2.6.32-squeeze-security: released (2.6.32-1) 

Modified: active/CVE-2009-4020
===================================================================
--- active/CVE-2009-4020	2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-4020	2010-02-14 21:56:00 UTC (rev 1736)
@@ -8,7 +8,7 @@
 upstream: released (2.6.33-rc1) [ec81aecb]
 2.6.32-upstream-stable: released (2.6.32.2) [037b7867]
 linux-2.6: released (2.6.32-3)
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security: needed
 2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch2) [bugfix/all/hfs-fix-a-potential-buffer-overflow.patch]
 2.6.26-lenny-security: released (2.6.26-21) [bugfix/all/hfs-fix-a-potential-buffer-overflow.patch]
 2.6.32-squeeze-security: released (2.6.32-3)

Modified: active/CVE-2009-4021
===================================================================
--- active/CVE-2009-4021	2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-4021	2010-02-14 21:56:00 UTC (rev 1736)
@@ -8,7 +8,7 @@
 Bugs:
 upstream: released (2.6.32-rc7) [f60311d5]
 linux-2.6: released (2.6.32-1)
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security: needed
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/fuse-prevent-fuse_put_request-on-invalid-pointer.patch]
 2.6.26-lenny-security: released (2.6.26-21) [bugfix/all/fuse-prevent-fuse_put_request-on-invalid-pointer.patch]
 2.6.32-squeeze-security: released (2.6.32-1)

Modified: active/CVE-2009-4536
===================================================================
--- active/CVE-2009-4536	2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-4536	2010-02-14 21:56:00 UTC (rev 1736)
@@ -10,7 +10,7 @@
 upstream: released (2.6.33-rc6) [40a14dea]
 2.6.32-upstream-stable:
 linux-2.6: released (2.6.32-6) [bugfix/all/e1000-enhance-frame-fragment-detection.patch]
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security:
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/e1000-enhance-frame-fragment-detection.patch]
 2.6.26-lenny-security: released (2.6.26-21lenny1) [bugfix/all/e1000-enhance-frame-fragment-detection.patch]
 2.6.32-squeeze-security: released (2.6.32-6) [bugfix/all/e1000-enhance-frame-fragment-detection.patch]

Modified: active/CVE-2009-4538
===================================================================
--- active/CVE-2009-4538	2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-4538	2010-02-14 21:56:00 UTC (rev 1736)
@@ -10,7 +10,7 @@
 upstream: released (2.6.33-rc6) [b94b5028]
 2.6.32-upstream-stable:
 linux-2.6: released (2.6.32-6) [bugfix/all/e1000e-enhance-fragment-detection.patch]
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security:
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/e1000e-enhance-frame-fragment-detection.patch]
 2.6.26-lenny-security: released (2.6.26-21lenny1) [bugfix/all/e1000e-enhance-frame-fragment-detection.patch]
 2.6.32-squeeze-security: released (2.6.32-6) [bugfix/all/e1000e-enhance-fragment-detection.patch]

Modified: active/CVE-2010-0003
===================================================================
--- active/CVE-2010-0003	2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2010-0003	2010-02-14 21:56:00 UTC (rev 1736)
@@ -8,7 +8,7 @@
 upstream: released (2.6.33-rc4) [b45c6e76bc]
 2.6.32-upstream-stable: released (2.6.32.4)
 linux-2.6: released (2.6.32-6) [bugfix/all/stable/2.6.32.4.patch]
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security:
 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/signal-fix-information-leak-with-print-fatal-signals.patch]
 2.6.26-lenny-security: released (2.6.26-21lenny1) [bugfix/all/signal-fix-information-leak-with-print-fatal-signals.patch]
 2.6.32-squeeze-security: released (2.6.32-6) [bugfix/all/stable/2.6.32.4.patch]




More information about the kernel-sec-discuss mailing list