[kernel-sec-discuss] r2095 - active retired

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Dec 13 17:40:05 UTC 2010


Author: jmm
Date: 2010-12-13 17:39:47 +0000 (Mon, 13 Dec 2010)
New Revision: 2095

Added:
   retired/CVE-2010-2942
   retired/CVE-2010-3849
Removed:
   active/CVE-2010-2942
   active/CVE-2010-3849
Log:
retire issues


Deleted: active/CVE-2010-2942
===================================================================
--- active/CVE-2010-2942	2010-12-13 17:36:26 UTC (rev 2094)
+++ active/CVE-2010-2942	2010-12-13 17:39:47 UTC (rev 2095)
@@ -1,14 +0,0 @@
-Candidate: CVE-2010-2942
-Description:
- 32-bits of kernel memory are leaked to user land via tc dump
-References:
- http://www.openwall.com/lists/oss-security/2010/08/18/1
- jmm> http://patchwork.ozlabs.org/patch/61857/
- jmm> https://bugzilla.redhat.com/show_bug.cgi?id=624903
-Notes:
-Bugs:
-upstream: released (2.6.36-rc3) [1c40be1]
-2.6.32-upstream-stable: released (2.6.32.27)
-linux-2.6: released (2.6.32-25) [bugfix/all/act_nat-use-stack-variable.patch, bugfix/all/net-sched-fix-some-memory-leaks.patch]
-2.6.26-lenny-security: released (2.6.26-25) [bugfix/all/net-sched-fix-some-kernel-memory-leaks.patch]
-2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/act_nat-use-stack-variable.patch, bugfix/all/net-sched-fix-some-memory-leaks.patch]

Deleted: active/CVE-2010-3849
===================================================================
--- active/CVE-2010-3849	2010-12-13 17:36:26 UTC (rev 2094)
+++ active/CVE-2010-3849	2010-12-13 17:39:47 UTC (rev 2095)
@@ -1,11 +0,0 @@
-Candidate: CVE-2010-3849
-Description:
-References:
- http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96
-Notes:
-Bugs:
-upstream: released (2.6.37-rc4) [fa0e846494792e722d817b9d3d625a4ef4896c96]
-2.6.32-upstream-stable: released (2.6.32.27)
-linux-2.6: released (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
-2.6.26-lenny-security: released (2.6.26-26lenny1) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
-2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]

Copied: retired/CVE-2010-2942 (from rev 2094, active/CVE-2010-2942)
===================================================================
--- retired/CVE-2010-2942	                        (rev 0)
+++ retired/CVE-2010-2942	2010-12-13 17:39:47 UTC (rev 2095)
@@ -0,0 +1,14 @@
+Candidate: CVE-2010-2942
+Description:
+ 32-bits of kernel memory are leaked to user land via tc dump
+References:
+ http://www.openwall.com/lists/oss-security/2010/08/18/1
+ jmm> http://patchwork.ozlabs.org/patch/61857/
+ jmm> https://bugzilla.redhat.com/show_bug.cgi?id=624903
+Notes:
+Bugs:
+upstream: released (2.6.36-rc3) [1c40be1]
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-25) [bugfix/all/act_nat-use-stack-variable.patch, bugfix/all/net-sched-fix-some-memory-leaks.patch]
+2.6.26-lenny-security: released (2.6.26-25) [bugfix/all/net-sched-fix-some-kernel-memory-leaks.patch]
+2.6.32-squeeze-security: released (2.6.32-25) [bugfix/all/act_nat-use-stack-variable.patch, bugfix/all/net-sched-fix-some-memory-leaks.patch]

Copied: retired/CVE-2010-3849 (from rev 2094, active/CVE-2010-3849)
===================================================================
--- retired/CVE-2010-3849	                        (rev 0)
+++ retired/CVE-2010-3849	2010-12-13 17:39:47 UTC (rev 2095)
@@ -0,0 +1,11 @@
+Candidate: CVE-2010-3849
+Description:
+References:
+ http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96
+Notes:
+Bugs:
+upstream: released (2.6.37-rc4) [fa0e846494792e722d817b9d3d625a4ef4896c96]
+2.6.32-upstream-stable: released (2.6.32.27)
+linux-2.6: released (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
+2.6.26-lenny-security: released (2.6.26-26lenny1) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]
+2.6.32-squeeze-security: released (2.6.32-28) [bugfix/all/econet-disallow-NULL-remote-addr-for-sendmsg.patch]




More information about the kernel-sec-discuss mailing list