diff options
author | Raphael Geissert <geissert@debian.org> | 2009-11-16 21:02:27 +0000 |
---|---|---|
committer | Raphael Geissert <geissert@debian.org> | 2009-11-16 21:02:27 +0000 |
commit | b1783767570d716b6400c28a2164e57367dd30fc (patch) | |
tree | a6c8fc1889b022d346392984415f4c4f90439054 | |
parent | 32321542bc80f52ba7e60cc2e93ed428652ccbbd (diff) |
updates
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1601 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r-- | active/CVE-2009-2584 | 8 | ||||
-rw-r--r-- | active/CVE-2009-2691 | 4 | ||||
-rw-r--r-- | active/CVE-2009-3621 | 4 | ||||
-rw-r--r-- | retired/CVE-2009-2848 | 4 |
4 files changed, 8 insertions, 12 deletions
diff --git a/active/CVE-2009-2584 b/active/CVE-2009-2584 index fbc076e9..390c63c3 100644 --- a/active/CVE-2009-2584 +++ b/active/CVE-2009-2584 @@ -15,12 +15,8 @@ Notes: - the patch is still not applied upstream so i've sent a message upstream to lkml: http://lkml.org/lkml/2009/11/4/538 Bugs: -upstream: pending (2.6.32-rc7) [d39b7dd1dcbf394a1cb897457c862dafe9a20ac5] -linux-2.6: needed +upstream: released (2.6.32-rc7) [d39b7dd1dcbf394a1cb897457c862dafe9a20ac5], released (2.6.31.6) [42d7bdfc3320039bb9310703d6475a62f5c74772] +linux-2.6: 3.6.31-2 2.6.18-etch-security: N/A "code not present" 2.6.24-etch-security: N/A "code not present" 2.6.26-lenny-security: N/A "code not present" -2.6.15-dapper-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: -2.6.27-intrepid-security: diff --git a/active/CVE-2009-2691 b/active/CVE-2009-2691 index 25ebada4..c6e36447 100644 --- a/active/CVE-2009-2691 +++ b/active/CVE-2009-2691 @@ -9,8 +9,8 @@ Notes: <dannf> lenny is vulnerable, but the upstream fix works by using a mutex construct that didn't exist until after 2.6.27 Bugs: -upstream: released (2.6.31-rc6) [13f0fea, 00f89d2, 704b836] -linux-2.6: released (2.6.31-1) +upstream: released (2.6.31-rc6) [13f0fea, 00f89d2, 704b836], released (2.6.30.5) [95d7e670e3158b6a52a8279290a0d6f7047250b4, 17dc3e97d6d51df33cb6e35fabb62b91ef14cf2c, c6d59cb0341e2c3aed3eb65cbf166a686c3443aa] +linux-2.6: released (2.6.30-7) 2.6.18-etch-security: ignored (2.6.18.dfsg.1-24etch4) "needs port" 2.6.24-etch-security: 2.6.26-lenny-security: ignored (2.6.26-19) "needs port" diff --git a/active/CVE-2009-3621 b/active/CVE-2009-3621 index c568014a..909c34fd 100644 --- a/active/CVE-2009-3621 +++ b/active/CVE-2009-3621 @@ -6,8 +6,8 @@ References: http://www.openwall.com/lists/oss-security/2009/10/19/2 Notes: Bugs: -upstream: released (2.6.32-rc6) [77238f2b942b38ab4e7f3aced44084493e4a8675] -linux-2.6: needed +upstream: released (2.6.32-rc6) [77238f2b942b38ab4e7f3aced44084493e4a8675], released (2.6.31.6) [027590f053888a282d09f420a39ad08a17dda76f] +linux-2.6: 2.6.31-2 2.6.18-etch-security: released (2.6.18.dfsg.1-26etch1) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch1) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch] 2.6.26-lenny-security: released (2.6.26-19lenny2) [bugfix/all/af_unix-fix-deadlock-on-connecting-to-shutdown-socket.patch] diff --git a/retired/CVE-2009-2848 b/retired/CVE-2009-2848 index a21a83ec..94414bb8 100644 --- a/retired/CVE-2009-2848 +++ b/retired/CVE-2009-2848 @@ -7,8 +7,8 @@ References: Ubuntu-Description: Notes: Bugs: -upstream: released (2.6.31) [9c8a8228d0827e0d91d28527209988f672f97d28] -linux-2.6: released (2.6.31-1) +upstream: released (2.6.31) [9c8a8228d0827e0d91d28527209988f672f97d28], released (2.6.30.5) [36bd78649e79b5689d263e51eec98e965c43ca3a] +linux-2.6: released (2.6.30-7) 2.6.18-etch-security: released (2.6.18.dfsg.1-24etch4) [bugfix/all/execve-must-clear-current-clear_child_tid.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.9etch1) [bugfix/all/execve-must-clear-current-clear_child_tid.patch] 2.6.26-lenny-security: released (2.6.26-19) [bugfix/all/execve-must-clear-current-clear_child_tid.patch] |