[kernel-sec-discuss] r1519 - active retired

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Oct 19 17:18:29 UTC 2009


Author: jmm
Date: 2009-10-19 17:18:28 +0000 (Mon, 19 Oct 2009)
New Revision: 1519

Added:
   retired/CVE-2008-2729
   retired/CVE-2008-2812
   retired/CVE-2008-2826
   retired/CVE-2008-3247
   retired/CVE-2008-3496
Removed:
   active/CVE-2008-2729
   active/CVE-2008-2812
   active/CVE-2008-2826
   active/CVE-2008-3247
   active/CVE-2008-3496
Log:
retire old issues


Deleted: active/CVE-2008-2729
===================================================================
--- active/CVE-2008-2729	2009-10-19 17:17:11 UTC (rev 1518)
+++ active/CVE-2008-2729	2009-10-19 17:18:28 UTC (rev 1519)
@@ -1,16 +0,0 @@
-Candidate: CVE-2008-2729
-Description: 
-References: 
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3022d734a54cbd2b65eea9a024564821101b4a9a
-Ubuntu-Description: 
-Notes: 
-Bugs: 
-upstream: released (2.6.19)
-linux-2.6: released (2.6.20-1)
-2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch]
-2.6.24-etch-security: N/A "Fixed upstream before 2.6.24"
-2.6.26-lenny-security: N/A
-2.6.15-dapper-security: released (2.6.15-52.69)
-2.6.20-feisty-security: N/A
-2.6.22-gutsy-security: N/A
-2.6.24-hardy-security: N/A

Deleted: active/CVE-2008-2812
===================================================================
--- active/CVE-2008-2812	2009-10-19 17:17:11 UTC (rev 1518)
+++ active/CVE-2008-2812	2009-10-19 17:18:28 UTC (rev 1519)
@@ -1,16 +0,0 @@
-Candidate: CVE-2008-2812
-Description: 
-References: 
-Ubuntu-Description: 
-Notes: 
-Bugs: 
-upstream: released (2.6.25.10)
-linux-2.6: released (2.6.25-7) [bugfix/all/stable/2.6.25.10.patch]
-2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/tty-fix-for-tty-operations-bugs.patch]
-2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/tty-fix-for-tty-operations-bugs.patch]
-2.6.26-lenny-security: N/A
-2.6.15-dapper-security: released (2.6.15-52.71)
-2.6.20-feisty-security: released (2.6.20-17.39)
-2.6.22-gutsy-security: released (2.6.22-15.58)
-2.6.24-hardy-security: released (2.6.24-19.41)
-2.6.27-intrepid-security: needed

Deleted: active/CVE-2008-2826
===================================================================
--- active/CVE-2008-2826	2009-10-19 17:17:11 UTC (rev 1518)
+++ active/CVE-2008-2826	2009-10-19 17:18:28 UTC (rev 1519)
@@ -1,17 +0,0 @@
-Candidate: CVE-2008-2826
-Description: 
- 735ce972fbc8a65fb17788debd7bbe7b4383cc62
-References: 
-Ubuntu-Description: 
-Notes: 
-Bugs: 
-upstream: released (2.6.26)
-linux-2.6: released (2.6.26-1)
-2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch]
-2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch]
-2.6.26-lenny-security: N/A
-2.6.15-dapper-security: released (2.6.15-52.69)
-2.6.20-feisty-security: released (2.6.20-17.37)
-2.6.22-gutsy-security: released (2.6.22-15.56)
-2.6.24-hardy-security: released (2.6.24-19.36)
-2.6.27-intrepid-security: N/A

Deleted: active/CVE-2008-3247
===================================================================
--- active/CVE-2008-3247	2009-10-19 17:17:11 UTC (rev 1518)
+++ active/CVE-2008-3247	2009-10-19 17:18:28 UTC (rev 1519)
@@ -1,17 +0,0 @@
-Candidate: CVE-2008-3247
-Description: 
-References: 
-Ubuntu-Description: 
-Notes: 
- kees> 2.6.25 only
-Bugs: 
-upstream: released (2.6.25.11, 2.6.26)
-linux-2.6: released (2.6.25-7)
-2.6.18-etch-security: N/A
-2.6.24-etch-security: N/A
-2.6.26-lenny-security: N/A
-2.6.15-dapper-security: N/A
-2.6.20-feisty-security: N/A
-2.6.22-gutsy-security: N/A
-2.6.24-hardy-security: N/A
-2.6.27-intrepid-security: N/A

Deleted: active/CVE-2008-3496
===================================================================
--- active/CVE-2008-3496	2009-10-19 17:17:11 UTC (rev 1518)
+++ active/CVE-2008-3496	2009-10-19 17:18:28 UTC (rev 1519)
@@ -1,20 +0,0 @@
-Candidate: CVE-2008-3496
-Description:
- Buffer overflow in format descriptor parsing in the uvc_parse_format
- function in drivers/media/video/uvc/uvc_driver.c in uvcvideo in the
- video4linux (V4L) implementation in the Linux kernel before 2.6.26.1
- has unknown impact and attack vectors. 
-References: 
-Ubuntu-Description: 
-Notes: 
-Bugs: 
-upstream: released (2.6.26.1)
-linux-2.6: released (2.6.26-2)
-2.6.18-etch-security: N/A
-2.6.24-etch-security: N/A
-2.6.26-lenny-security: released (2.6.26-2)
-2.6.15-dapper-security: N/A
-2.6.20-feisty-security: N/A
-2.6.22-gutsy-security: N/A
-2.6.24-hardy-security: N/A
-2.6.27-intrepid-security: N/A

Copied: retired/CVE-2008-2729 (from rev 1518, active/CVE-2008-2729)
===================================================================
--- retired/CVE-2008-2729	                        (rev 0)
+++ retired/CVE-2008-2729	2009-10-19 17:18:28 UTC (rev 1519)
@@ -0,0 +1,16 @@
+Candidate: CVE-2008-2729
+Description: 
+References: 
+ http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3022d734a54cbd2b65eea9a024564821101b4a9a
+Ubuntu-Description: 
+Notes: 
+Bugs: 
+upstream: released (2.6.19)
+linux-2.6: released (2.6.20-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch]
+2.6.24-etch-security: N/A "Fixed upstream before 2.6.24"
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: released (2.6.15-52.69)
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A

Copied: retired/CVE-2008-2812 (from rev 1516, active/CVE-2008-2812)
===================================================================
--- retired/CVE-2008-2812	                        (rev 0)
+++ retired/CVE-2008-2812	2009-10-19 17:18:28 UTC (rev 1519)
@@ -0,0 +1,16 @@
+Candidate: CVE-2008-2812
+Description: 
+References: 
+Ubuntu-Description: 
+Notes: 
+Bugs: 
+upstream: released (2.6.25.10)
+linux-2.6: released (2.6.25-7) [bugfix/all/stable/2.6.25.10.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/tty-fix-for-tty-operations-bugs.patch]
+2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/tty-fix-for-tty-operations-bugs.patch]
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: released (2.6.15-52.71)
+2.6.20-feisty-security: released (2.6.20-17.39)
+2.6.22-gutsy-security: released (2.6.22-15.58)
+2.6.24-hardy-security: released (2.6.24-19.41)
+2.6.27-intrepid-security: needed

Copied: retired/CVE-2008-2826 (from rev 1516, active/CVE-2008-2826)
===================================================================
--- retired/CVE-2008-2826	                        (rev 0)
+++ retired/CVE-2008-2826	2009-10-19 17:18:28 UTC (rev 1519)
@@ -0,0 +1,17 @@
+Candidate: CVE-2008-2826
+Description: 
+ 735ce972fbc8a65fb17788debd7bbe7b4383cc62
+References: 
+Ubuntu-Description: 
+Notes: 
+Bugs: 
+upstream: released (2.6.26)
+linux-2.6: released (2.6.26-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch]
+2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch]
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: released (2.6.15-52.69)
+2.6.20-feisty-security: released (2.6.20-17.37)
+2.6.22-gutsy-security: released (2.6.22-15.56)
+2.6.24-hardy-security: released (2.6.24-19.36)
+2.6.27-intrepid-security: N/A

Copied: retired/CVE-2008-3247 (from rev 1516, active/CVE-2008-3247)
===================================================================
--- retired/CVE-2008-3247	                        (rev 0)
+++ retired/CVE-2008-3247	2009-10-19 17:18:28 UTC (rev 1519)
@@ -0,0 +1,17 @@
+Candidate: CVE-2008-3247
+Description: 
+References: 
+Ubuntu-Description: 
+Notes: 
+ kees> 2.6.25 only
+Bugs: 
+upstream: released (2.6.25.11, 2.6.26)
+linux-2.6: released (2.6.25-7)
+2.6.18-etch-security: N/A
+2.6.24-etch-security: N/A
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: N/A
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A
+2.6.27-intrepid-security: N/A

Copied: retired/CVE-2008-3496 (from rev 1516, active/CVE-2008-3496)
===================================================================
--- retired/CVE-2008-3496	                        (rev 0)
+++ retired/CVE-2008-3496	2009-10-19 17:18:28 UTC (rev 1519)
@@ -0,0 +1,20 @@
+Candidate: CVE-2008-3496
+Description:
+ Buffer overflow in format descriptor parsing in the uvc_parse_format
+ function in drivers/media/video/uvc/uvc_driver.c in uvcvideo in the
+ video4linux (V4L) implementation in the Linux kernel before 2.6.26.1
+ has unknown impact and attack vectors. 
+References: 
+Ubuntu-Description: 
+Notes: 
+Bugs: 
+upstream: released (2.6.26.1)
+linux-2.6: released (2.6.26-2)
+2.6.18-etch-security: N/A
+2.6.24-etch-security: N/A
+2.6.26-lenny-security: released (2.6.26-2)
+2.6.15-dapper-security: N/A
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A
+2.6.27-intrepid-security: N/A




More information about the kernel-sec-discuss mailing list