[kernel-sec-discuss] r1825 - active retired

Michael Gilbert gilbert-guest at alioth.debian.org
Thu May 6 03:24:02 UTC 2010


Author: gilbert-guest
Date: 2010-05-06 03:24:01 +0000 (Thu, 06 May 2010)
New Revision: 1825

Added:
   retired/CVE-2010-1488
Removed:
   active/CVE-2010-1488
Modified:
   active/CVE-2010-1446
   active/CVE-2010-thinkpad-dos
Log:
updates; retire an issue

Modified: active/CVE-2010-1446
===================================================================
--- active/CVE-2010-1446	2010-05-05 21:42:32 UTC (rev 1824)
+++ active/CVE-2010-1446	2010-05-06 03:24:01 UTC (rev 1825)
@@ -5,7 +5,7 @@
 Notes:
 Bugs:
 upstream:
-2.6.32-upstream-stable: released (2.6.32-12) [bugfix/powerpc/kgdb-dont-needlessly-skip-PAGE_USER-test-for-Fsl-booke.patch]
-linux-2.6:
+2.6.32-upstream-stable:
+linux-2.6: released (2.6.32-12) [bugfix/powerpc/kgdb-dont-needlessly-skip-PAGE_USER-test-for-Fsl-booke.patch]
 2.6.26-lenny-security:
 2.6.32-squeeze-security: released (2.6.32-12) [bugfix/powerpc/kgdb-dont-needlessly-skip-PAGE_USER-test-for-Fsl-booke.patch]

Deleted: active/CVE-2010-1488
===================================================================
--- active/CVE-2010-1488	2010-05-05 21:42:32 UTC (rev 1824)
+++ active/CVE-2010-1488	2010-05-06 03:24:01 UTC (rev 1825)
@@ -1,12 +0,0 @@
-Candidate: CVE-2010-1488
-Description:
- oom: fix the unsafe usage of badness() in proc_oom_score()
-References:
- http://www.openwall.com/lists/oss-security/2010/04/14/1
-Notes:
-Bugs:
-upstream: released (2.6.34-rc4) [b95c35e7]
-2.6.32-upstream-stable: released (2.6.32.12) [e72f38d3]
-linux-2.6: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
-2.6.26-lenny-security: N/A "introduced in 2.6.32 commit 28b83c51"
-2.6.32-squeeze-security: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]

Modified: active/CVE-2010-thinkpad-dos
===================================================================
--- active/CVE-2010-thinkpad-dos	2010-05-05 21:42:32 UTC (rev 1824)
+++ active/CVE-2010-thinkpad-dos	2010-05-06 03:24:01 UTC (rev 1825)
@@ -9,7 +9,7 @@
 Bugs:
  http://bugs.debian.org/565790 
 upstream: released (2.6.34-rc1) [b525c06c]
-2.6.32-upstream-stable: needed 
-linux-2.6: needed
+2.6.32-upstream-stable: released (2.6.32.12) [1b0d63f1] 
+linux-2.6: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
 2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]

Copied: retired/CVE-2010-1488 (from rev 1824, active/CVE-2010-1488)
===================================================================
--- retired/CVE-2010-1488	                        (rev 0)
+++ retired/CVE-2010-1488	2010-05-06 03:24:01 UTC (rev 1825)
@@ -0,0 +1,12 @@
+Candidate: CVE-2010-1488
+Description:
+ oom: fix the unsafe usage of badness() in proc_oom_score()
+References:
+ http://www.openwall.com/lists/oss-security/2010/04/14/1
+Notes:
+Bugs:
+upstream: released (2.6.34-rc4) [b95c35e7]
+2.6.32-upstream-stable: released (2.6.32.12) [e72f38d3]
+linux-2.6: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
+2.6.26-lenny-security: N/A "introduced in 2.6.32 commit 28b83c51"
+2.6.32-squeeze-security: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]




More information about the kernel-sec-discuss mailing list