summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRaphael Geissert <geissert@debian.org>2009-11-16 21:02:27 +0000
committerRaphael Geissert <geissert@debian.org>2009-11-16 21:02:27 +0000
commitb1783767570d716b6400c28a2164e57367dd30fc (patch)
treea6c8fc1889b022d346392984415f4c4f90439054
parent32321542bc80f52ba7e60cc2e93ed428652ccbbd (diff)
updates
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1601 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r--active/CVE-2009-25848
-rw-r--r--active/CVE-2009-26914
-rw-r--r--active/CVE-2009-36214
-rw-r--r--retired/CVE-2009-28484
4 files changed, 8 insertions, 12 deletions
diff --git a/active/CVE-2009-2584 b/active/CVE-2009-2584
index fbc076e9..390c63c3 100644
--- a/active/CVE-2009-2584
+++ b/active/CVE-2009-2584
@@ -15,12 +15,8 @@ Notes:
- the patch is still not applied upstream so i've sent a message upstream to lkml:
http://lkml.org/lkml/2009/11/4/538
Bugs:
-upstream: pending (2.6.32-rc7) [d39b7dd1dcbf394a1cb897457c862dafe9a20ac5]
-linux-2.6: needed
+upstream: released (2.6.32-rc7) [d39b7dd1dcbf394a1cb897457c862dafe9a20ac5], released (2.6.31.6) [42d7bdfc3320039bb9310703d6475a62f5c74772]
+linux-2.6: 3.6.31-2
2.6.18-etch-security: N/A "code not present"
2.6.24-etch-security: N/A "code not present"
2.6.26-lenny-security: N/A "code not present"
-2.6.15-dapper-security:
-2.6.22-gutsy-security:
-2.6.24-hardy-security:
-2.6.27-intrepid-security:
diff --git a/active/CVE-2009-2691 b/active/CVE-2009-2691
index 25ebada4..c6e36447 100644
--- a/active/CVE-2009-2691
+++ b/active/CVE-2009-2691
@@ -9,8 +9,8 @@ Notes:
<dannf> lenny is vulnerable, but the upstream fix works by using a mutex
construct that didn't exist until after 2.6.27
Bugs:
-upstream: released (2.6.31-rc6) [13f0fea, 00f89d2, 704b836]
-linux-2.6: released (2.6.31-1)
+upstream: released (2.6.31-rc6) [13f0fea, 00f89d2, 704b836], released (2.6.30.5) [95d7e670e3158b6a52a8279290a0d6f7047250b4, 17dc3e97d6d51df33cb6e35fabb62b91ef14cf2c, c6d59cb0341e2c3aed3eb65cbf166a686c3443aa]
+linux-2.6: released (2.6.30-7)
2.6.18-etch-security: ignored (2.6.18.dfsg.1-24etch4) "needs port"
2.6.24-etch-security:
2.6.26-lenny-security: ignored (2.6.26-19) "needs port"
diff --git a/active/CVE-2009-3621 b/active/CVE-2009-3621
index c568014a..909c34fd 100644
--- a/active/CVE-2009-3621
+++ b/active/CVE-2009-3621
@@ -6,8 +6,8 @@ References:
http://www.openwall.com/lists/oss-security/2009/10/19/2
Notes:
Bugs:
-upstream: released (2.6.32-rc6) [77238f2b942b38ab4e7f3aced44084493e4a8675]
-linux-2.6: needed
+upstream: released (2.6.32-rc6) [77238f2b942b38ab4e7f3aced44084493e4a8675], released (2.6.31.6) [027590f053888a282d09f420a39ad08a17dda76f]
+linux-2.6: 2.6.31-2
2.6.18-etch-security: released (2.6.18.dfsg.1-26etch1) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch]
2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch1) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch]
2.6.26-lenny-security: released (2.6.26-19lenny2) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch]
diff --git a/retired/CVE-2009-2848 b/retired/CVE-2009-2848
index a21a83ec..94414bb8 100644
--- a/retired/CVE-2009-2848
+++ b/retired/CVE-2009-2848
@@ -7,8 +7,8 @@ References:
Ubuntu-Description:
Notes:
Bugs:
-upstream: released (2.6.31) [9c8a8228d0827e0d91d28527209988f672f97d28]
-linux-2.6: released (2.6.31-1)
+upstream: released (2.6.31) [9c8a8228d0827e0d91d28527209988f672f97d28], released (2.6.30.5) [36bd78649e79b5689d263e51eec98e965c43ca3a]
+linux-2.6: released (2.6.30-7)
2.6.18-etch-security: released (2.6.18.dfsg.1-24etch4) [bugfix/all/execve-must-clear-current-clear_child_tid.patch]
2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch1) [bugfix/all/execve-must-clear-current-clear_child_tid.patch]
2.6.26-lenny-security: released (2.6.26-19) [bugfix/all/execve-must-clear-current-clear_child_tid.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy