[kernel-sec-discuss] r1668 - active

Michael Gilbert gilbert-guest at alioth.debian.org
Wed Jan 13 21:59:53 UTC 2010


Author: gilbert-guest
Date: 2010-01-13 21:59:52 +0000 (Wed, 13 Jan 2010)
New Revision: 1668

Added:
   active/CVE-2010-0003
Modified:
   active/CVE-2009-3939
Log:
new issue and etch not affected by CVE-2009-3939

Modified: active/CVE-2009-3939
===================================================================
--- active/CVE-2009-3939	2009-12-31 20:11:46 UTC (rev 1667)
+++ active/CVE-2009-3939	2010-01-13 21:59:52 UTC (rev 1668)
@@ -8,9 +8,9 @@
 Notes:
  jmm> Introduced in ad84db2e2e1817bb8a29e7c9108eb66bf023d99f
 Bugs: #562975 (patch available)
-upstream:
-2.6.31-upstream-stable:
-linux-2.6:
-2.6.18-etch-security: N/A (Vulnerable code not present)
-2.6.24-etch-security:
+upstream: needed
+2.6.32-upstream-stable:
+linux-2.6: needed
+2.6.18-etch-security: N/A "introduced in 2.6.25 commit ad84db2e"
+2.6.24-etch-security: N/A "introduced in 2.6.25 commit ad84db2e"
 2.6.26-lenny-security: ignored "not committed upstream yet"

Added: active/CVE-2010-0003
===================================================================
--- active/CVE-2010-0003	                        (rev 0)
+++ active/CVE-2010-0003	2010-01-13 21:59:52 UTC (rev 1668)
@@ -0,0 +1,15 @@
+Candidate: CVE-2010-0003
+Description:
+ kernel info leak if print-fatal-signals=1
+References:
+ http://www.openwall.com/lists/oss-security/2010/01/12/1
+Notes:
+Bugs:
+upstream: released (2.6.33-rc4) [b45c6e76bc]
+2.6.31-upstream-stable:
+2.6.32-upstream-stable:
+linux-2.6:
+2.6.18-etch-security:
+2.6.24-etch-security:
+2.6.26-lenny-security:
+2.6.32-squeeze-security:




More information about the kernel-sec-discuss mailing list