[kernel-sec-discuss] r1778 - active

Dann Frazier dannf at alioth.debian.org
Mon Mar 15 17:47:16 UTC 2010


Author: dannf
Date: 2010-03-15 17:47:13 +0000 (Mon, 15 Mar 2010)
New Revision: 1778

Modified:
   active/CVE-2009-3725
   active/CVE-2010-0622
Log:
2.6.26-21lenny4 released

Modified: active/CVE-2009-3725
===================================================================
--- active/CVE-2009-3725	2010-03-11 18:13:17 UTC (rev 1777)
+++ active/CVE-2009-3725	2010-03-15 17:47:13 UTC (rev 1778)
@@ -14,4 +14,4 @@
 linux-2.6: released (2.6.31-1)
 2.6.18-etch-security: N/A
 2.6.24-etch-security: ignored (EOL)
-2.6.26-lenny-security: pending (2.6.26-21lenny4) [bugfix/all/connector-keep-the-skb-in-cn_callback_data.patch, bugfix/all/connector-provide-the-sender-s-credentials-to-the-callback.patch, bugfix/all/connector-removed-the-destruct_data-callback-since-it-is-always-kfree_skb.patch, bugfix/all/uvesafb-connector-disallow-unpliviged-users-to-send-netlink-packets.patch]
+2.6.26-lenny-security: released (2.6.26-21lenny4) [bugfix/all/connector-keep-the-skb-in-cn_callback_data.patch, bugfix/all/connector-provide-the-sender-s-credentials-to-the-callback.patch, bugfix/all/connector-removed-the-destruct_data-callback-since-it-is-always-kfree_skb.patch, bugfix/all/uvesafb-connector-disallow-unpliviged-users-to-send-netlink-packets.patch]

Modified: active/CVE-2010-0622
===================================================================
--- active/CVE-2010-0622	2010-03-11 18:13:17 UTC (rev 1777)
+++ active/CVE-2010-0622	2010-03-15 17:47:13 UTC (rev 1778)
@@ -10,5 +10,5 @@
 linux-2.6: released (2.6.32-9)
 2.6.18-etch-security: released (2.6.18.dfsg.1-26etch2) [bugfix/all/futex-handle-user-space-corruption-gracefully.patch]
 2.6.24-etch-security: released (2.6.24~6etchnhalf.9etch3) [bugfix/all/futex-handle-user-space-corruption-gracefully.patch]
-2.6.26-lenny-security: pending (2.6.26-21lenny4) [bugfix/all/futex-handle-user-space-corruption-gracefully.patch]
+2.6.26-lenny-security: released (2.6.26-21lenny4) [bugfix/all/futex-handle-user-space-corruption-gracefully.patch]
 2.6.32-squeeze-security: released (2.6.32-9)




More information about the kernel-sec-discuss mailing list