[kernel-sec-discuss] r1736 - active
Dann Frazier
dannf at alioth.debian.org
Sun Feb 14 21:56:00 UTC 2010
Author: dannf
Date: 2010-02-14 21:56:00 +0000 (Sun, 14 Feb 2010)
New Revision: 1736
Modified:
active/CVE-2009-3620
active/CVE-2009-3726
active/CVE-2009-4005
active/CVE-2009-4020
active/CVE-2009-4021
active/CVE-2009-4536
active/CVE-2009-4538
active/CVE-2010-0003
Log:
un-EOL these - one more 2.6.18 update is planned
Modified: active/CVE-2009-3620
===================================================================
--- active/CVE-2009-3620 2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-3620 2010-02-14 21:56:00 UTC (rev 1736)
@@ -9,6 +9,6 @@
Bugs:
upstream: released (2.6.32-rc1) [7dc482dfeeeefcfd000d4271c4626937406756d7]
linux-2.6: released (2.6.32-1)
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security: needed
2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch1) [bugfix/all/drm+r128-Add-test-for-init-to-all-reqd-ioctls.patch]
2.6.26-lenny-security: released (2.6.26-19lenny2) [bugfix/all/drm+r128-Add-test-for-init-to-all-reqd-ioctls.patch]
Modified: active/CVE-2009-3726
===================================================================
--- active/CVE-2009-3726 2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-3726 2010-02-14 21:56:00 UTC (rev 1736)
@@ -8,6 +8,6 @@
Bugs:
upstream: released (2.6.31) [d953126a28f97ec965d23c69fd5795854c048f30]
linux-2.6: released (2.6.31-1)
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security:
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/nfsv4-buggy-server-oops.patch]
2.6.26-lenny-security: released (2.6.26-21) [bugfix/all/nfsv4-buggy-server-oops.patch]
Modified: active/CVE-2009-4005
===================================================================
--- active/CVE-2009-4005 2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-4005 2010-02-14 21:56:00 UTC (rev 1736)
@@ -8,7 +8,7 @@
upstream: released (2.6.32-rc7) [286e633e]
2.6.31-upstream-stable: N/A
linux-2.6: released (2.6.32-1)
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security: needed
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/isdn-hfc_usb-fix-read-buffer-overflow.patch]
2.6.26-lenny-security: released (2.6.26-21) [bugfix/all/isdn-hfc_usb-fix-read-buffer-overflow.patch]
2.6.32-squeeze-security: released (2.6.32-1)
Modified: active/CVE-2009-4020
===================================================================
--- active/CVE-2009-4020 2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-4020 2010-02-14 21:56:00 UTC (rev 1736)
@@ -8,7 +8,7 @@
upstream: released (2.6.33-rc1) [ec81aecb]
2.6.32-upstream-stable: released (2.6.32.2) [037b7867]
linux-2.6: released (2.6.32-3)
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security: needed
2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch2) [bugfix/all/hfs-fix-a-potential-buffer-overflow.patch]
2.6.26-lenny-security: released (2.6.26-21) [bugfix/all/hfs-fix-a-potential-buffer-overflow.patch]
2.6.32-squeeze-security: released (2.6.32-3)
Modified: active/CVE-2009-4021
===================================================================
--- active/CVE-2009-4021 2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-4021 2010-02-14 21:56:00 UTC (rev 1736)
@@ -8,7 +8,7 @@
Bugs:
upstream: released (2.6.32-rc7) [f60311d5]
linux-2.6: released (2.6.32-1)
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security: needed
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/fuse-prevent-fuse_put_request-on-invalid-pointer.patch]
2.6.26-lenny-security: released (2.6.26-21) [bugfix/all/fuse-prevent-fuse_put_request-on-invalid-pointer.patch]
2.6.32-squeeze-security: released (2.6.32-1)
Modified: active/CVE-2009-4536
===================================================================
--- active/CVE-2009-4536 2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-4536 2010-02-14 21:56:00 UTC (rev 1736)
@@ -10,7 +10,7 @@
upstream: released (2.6.33-rc6) [40a14dea]
2.6.32-upstream-stable:
linux-2.6: released (2.6.32-6) [bugfix/all/e1000-enhance-frame-fragment-detection.patch]
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security:
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/e1000-enhance-frame-fragment-detection.patch]
2.6.26-lenny-security: released (2.6.26-21lenny1) [bugfix/all/e1000-enhance-frame-fragment-detection.patch]
2.6.32-squeeze-security: released (2.6.32-6) [bugfix/all/e1000-enhance-frame-fragment-detection.patch]
Modified: active/CVE-2009-4538
===================================================================
--- active/CVE-2009-4538 2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2009-4538 2010-02-14 21:56:00 UTC (rev 1736)
@@ -10,7 +10,7 @@
upstream: released (2.6.33-rc6) [b94b5028]
2.6.32-upstream-stable:
linux-2.6: released (2.6.32-6) [bugfix/all/e1000e-enhance-fragment-detection.patch]
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security:
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/e1000e-enhance-frame-fragment-detection.patch]
2.6.26-lenny-security: released (2.6.26-21lenny1) [bugfix/all/e1000e-enhance-frame-fragment-detection.patch]
2.6.32-squeeze-security: released (2.6.32-6) [bugfix/all/e1000e-enhance-fragment-detection.patch]
Modified: active/CVE-2010-0003
===================================================================
--- active/CVE-2010-0003 2010-02-14 21:48:04 UTC (rev 1735)
+++ active/CVE-2010-0003 2010-02-14 21:56:00 UTC (rev 1736)
@@ -8,7 +8,7 @@
upstream: released (2.6.33-rc4) [b45c6e76bc]
2.6.32-upstream-stable: released (2.6.32.4)
linux-2.6: released (2.6.32-6) [bugfix/all/stable/2.6.32.4.patch]
-2.6.18-etch-security: ignored (EOL)
+2.6.18-etch-security:
2.6.24-etch-security: pending (2.6.24-6~etchnhalf.9etch2) [bugfix/all/signal-fix-information-leak-with-print-fatal-signals.patch]
2.6.26-lenny-security: released (2.6.26-21lenny1) [bugfix/all/signal-fix-information-leak-with-print-fatal-signals.patch]
2.6.32-squeeze-security: released (2.6.32-6) [bugfix/all/stable/2.6.32.4.patch]
More information about the kernel-sec-discuss
mailing list