[kernel-sec-discuss] r1519 - active retired
Moritz Muehlenhoff
jmm at alioth.debian.org
Mon Oct 19 17:18:29 UTC 2009
Author: jmm
Date: 2009-10-19 17:18:28 +0000 (Mon, 19 Oct 2009)
New Revision: 1519
Added:
retired/CVE-2008-2729
retired/CVE-2008-2812
retired/CVE-2008-2826
retired/CVE-2008-3247
retired/CVE-2008-3496
Removed:
active/CVE-2008-2729
active/CVE-2008-2812
active/CVE-2008-2826
active/CVE-2008-3247
active/CVE-2008-3496
Log:
retire old issues
Deleted: active/CVE-2008-2729
===================================================================
--- active/CVE-2008-2729 2009-10-19 17:17:11 UTC (rev 1518)
+++ active/CVE-2008-2729 2009-10-19 17:18:28 UTC (rev 1519)
@@ -1,16 +0,0 @@
-Candidate: CVE-2008-2729
-Description:
-References:
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3022d734a54cbd2b65eea9a024564821101b4a9a
-Ubuntu-Description:
-Notes:
-Bugs:
-upstream: released (2.6.19)
-linux-2.6: released (2.6.20-1)
-2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch]
-2.6.24-etch-security: N/A "Fixed upstream before 2.6.24"
-2.6.26-lenny-security: N/A
-2.6.15-dapper-security: released (2.6.15-52.69)
-2.6.20-feisty-security: N/A
-2.6.22-gutsy-security: N/A
-2.6.24-hardy-security: N/A
Deleted: active/CVE-2008-2812
===================================================================
--- active/CVE-2008-2812 2009-10-19 17:17:11 UTC (rev 1518)
+++ active/CVE-2008-2812 2009-10-19 17:18:28 UTC (rev 1519)
@@ -1,16 +0,0 @@
-Candidate: CVE-2008-2812
-Description:
-References:
-Ubuntu-Description:
-Notes:
-Bugs:
-upstream: released (2.6.25.10)
-linux-2.6: released (2.6.25-7) [bugfix/all/stable/2.6.25.10.patch]
-2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/tty-fix-for-tty-operations-bugs.patch]
-2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/tty-fix-for-tty-operations-bugs.patch]
-2.6.26-lenny-security: N/A
-2.6.15-dapper-security: released (2.6.15-52.71)
-2.6.20-feisty-security: released (2.6.20-17.39)
-2.6.22-gutsy-security: released (2.6.22-15.58)
-2.6.24-hardy-security: released (2.6.24-19.41)
-2.6.27-intrepid-security: needed
Deleted: active/CVE-2008-2826
===================================================================
--- active/CVE-2008-2826 2009-10-19 17:17:11 UTC (rev 1518)
+++ active/CVE-2008-2826 2009-10-19 17:18:28 UTC (rev 1519)
@@ -1,17 +0,0 @@
-Candidate: CVE-2008-2826
-Description:
- 735ce972fbc8a65fb17788debd7bbe7b4383cc62
-References:
-Ubuntu-Description:
-Notes:
-Bugs:
-upstream: released (2.6.26)
-linux-2.6: released (2.6.26-1)
-2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch]
-2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch]
-2.6.26-lenny-security: N/A
-2.6.15-dapper-security: released (2.6.15-52.69)
-2.6.20-feisty-security: released (2.6.20-17.37)
-2.6.22-gutsy-security: released (2.6.22-15.56)
-2.6.24-hardy-security: released (2.6.24-19.36)
-2.6.27-intrepid-security: N/A
Deleted: active/CVE-2008-3247
===================================================================
--- active/CVE-2008-3247 2009-10-19 17:17:11 UTC (rev 1518)
+++ active/CVE-2008-3247 2009-10-19 17:18:28 UTC (rev 1519)
@@ -1,17 +0,0 @@
-Candidate: CVE-2008-3247
-Description:
-References:
-Ubuntu-Description:
-Notes:
- kees> 2.6.25 only
-Bugs:
-upstream: released (2.6.25.11, 2.6.26)
-linux-2.6: released (2.6.25-7)
-2.6.18-etch-security: N/A
-2.6.24-etch-security: N/A
-2.6.26-lenny-security: N/A
-2.6.15-dapper-security: N/A
-2.6.20-feisty-security: N/A
-2.6.22-gutsy-security: N/A
-2.6.24-hardy-security: N/A
-2.6.27-intrepid-security: N/A
Deleted: active/CVE-2008-3496
===================================================================
--- active/CVE-2008-3496 2009-10-19 17:17:11 UTC (rev 1518)
+++ active/CVE-2008-3496 2009-10-19 17:18:28 UTC (rev 1519)
@@ -1,20 +0,0 @@
-Candidate: CVE-2008-3496
-Description:
- Buffer overflow in format descriptor parsing in the uvc_parse_format
- function in drivers/media/video/uvc/uvc_driver.c in uvcvideo in the
- video4linux (V4L) implementation in the Linux kernel before 2.6.26.1
- has unknown impact and attack vectors.
-References:
-Ubuntu-Description:
-Notes:
-Bugs:
-upstream: released (2.6.26.1)
-linux-2.6: released (2.6.26-2)
-2.6.18-etch-security: N/A
-2.6.24-etch-security: N/A
-2.6.26-lenny-security: released (2.6.26-2)
-2.6.15-dapper-security: N/A
-2.6.20-feisty-security: N/A
-2.6.22-gutsy-security: N/A
-2.6.24-hardy-security: N/A
-2.6.27-intrepid-security: N/A
Copied: retired/CVE-2008-2729 (from rev 1518, active/CVE-2008-2729)
===================================================================
--- retired/CVE-2008-2729 (rev 0)
+++ retired/CVE-2008-2729 2009-10-19 17:18:28 UTC (rev 1519)
@@ -0,0 +1,16 @@
+Candidate: CVE-2008-2729
+Description:
+References:
+ http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=3022d734a54cbd2b65eea9a024564821101b4a9a
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream: released (2.6.19)
+linux-2.6: released (2.6.20-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch]
+2.6.24-etch-security: N/A "Fixed upstream before 2.6.24"
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: released (2.6.15-52.69)
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A
Copied: retired/CVE-2008-2812 (from rev 1516, active/CVE-2008-2812)
===================================================================
--- retired/CVE-2008-2812 (rev 0)
+++ retired/CVE-2008-2812 2009-10-19 17:18:28 UTC (rev 1519)
@@ -0,0 +1,16 @@
+Candidate: CVE-2008-2812
+Description:
+References:
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream: released (2.6.25.10)
+linux-2.6: released (2.6.25-7) [bugfix/all/stable/2.6.25.10.patch]
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/tty-fix-for-tty-operations-bugs.patch]
+2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/tty-fix-for-tty-operations-bugs.patch]
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: released (2.6.15-52.71)
+2.6.20-feisty-security: released (2.6.20-17.39)
+2.6.22-gutsy-security: released (2.6.22-15.58)
+2.6.24-hardy-security: released (2.6.24-19.41)
+2.6.27-intrepid-security: needed
Copied: retired/CVE-2008-2826 (from rev 1516, active/CVE-2008-2826)
===================================================================
--- retired/CVE-2008-2826 (rev 0)
+++ retired/CVE-2008-2826 2009-10-19 17:18:28 UTC (rev 1519)
@@ -0,0 +1,17 @@
+Candidate: CVE-2008-2826
+Description:
+ 735ce972fbc8a65fb17788debd7bbe7b4383cc62
+References:
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream: released (2.6.26)
+linux-2.6: released (2.6.26-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch]
+2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch]
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: released (2.6.15-52.69)
+2.6.20-feisty-security: released (2.6.20-17.37)
+2.6.22-gutsy-security: released (2.6.22-15.56)
+2.6.24-hardy-security: released (2.6.24-19.36)
+2.6.27-intrepid-security: N/A
Copied: retired/CVE-2008-3247 (from rev 1516, active/CVE-2008-3247)
===================================================================
--- retired/CVE-2008-3247 (rev 0)
+++ retired/CVE-2008-3247 2009-10-19 17:18:28 UTC (rev 1519)
@@ -0,0 +1,17 @@
+Candidate: CVE-2008-3247
+Description:
+References:
+Ubuntu-Description:
+Notes:
+ kees> 2.6.25 only
+Bugs:
+upstream: released (2.6.25.11, 2.6.26)
+linux-2.6: released (2.6.25-7)
+2.6.18-etch-security: N/A
+2.6.24-etch-security: N/A
+2.6.26-lenny-security: N/A
+2.6.15-dapper-security: N/A
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A
+2.6.27-intrepid-security: N/A
Copied: retired/CVE-2008-3496 (from rev 1516, active/CVE-2008-3496)
===================================================================
--- retired/CVE-2008-3496 (rev 0)
+++ retired/CVE-2008-3496 2009-10-19 17:18:28 UTC (rev 1519)
@@ -0,0 +1,20 @@
+Candidate: CVE-2008-3496
+Description:
+ Buffer overflow in format descriptor parsing in the uvc_parse_format
+ function in drivers/media/video/uvc/uvc_driver.c in uvcvideo in the
+ video4linux (V4L) implementation in the Linux kernel before 2.6.26.1
+ has unknown impact and attack vectors.
+References:
+Ubuntu-Description:
+Notes:
+Bugs:
+upstream: released (2.6.26.1)
+linux-2.6: released (2.6.26-2)
+2.6.18-etch-security: N/A
+2.6.24-etch-security: N/A
+2.6.26-lenny-security: released (2.6.26-2)
+2.6.15-dapper-security: N/A
+2.6.20-feisty-security: N/A
+2.6.22-gutsy-security: N/A
+2.6.24-hardy-security: N/A
+2.6.27-intrepid-security: N/A
More information about the kernel-sec-discuss
mailing list