[kernel-sec-discuss] r1825 - active retired
Michael Gilbert
gilbert-guest at alioth.debian.org
Thu May 6 03:24:02 UTC 2010
Author: gilbert-guest
Date: 2010-05-06 03:24:01 +0000 (Thu, 06 May 2010)
New Revision: 1825
Added:
retired/CVE-2010-1488
Removed:
active/CVE-2010-1488
Modified:
active/CVE-2010-1446
active/CVE-2010-thinkpad-dos
Log:
updates; retire an issue
Modified: active/CVE-2010-1446
===================================================================
--- active/CVE-2010-1446 2010-05-05 21:42:32 UTC (rev 1824)
+++ active/CVE-2010-1446 2010-05-06 03:24:01 UTC (rev 1825)
@@ -5,7 +5,7 @@
Notes:
Bugs:
upstream:
-2.6.32-upstream-stable: released (2.6.32-12) [bugfix/powerpc/kgdb-dont-needlessly-skip-PAGE_USER-test-for-Fsl-booke.patch]
-linux-2.6:
+2.6.32-upstream-stable:
+linux-2.6: released (2.6.32-12) [bugfix/powerpc/kgdb-dont-needlessly-skip-PAGE_USER-test-for-Fsl-booke.patch]
2.6.26-lenny-security:
2.6.32-squeeze-security: released (2.6.32-12) [bugfix/powerpc/kgdb-dont-needlessly-skip-PAGE_USER-test-for-Fsl-booke.patch]
Deleted: active/CVE-2010-1488
===================================================================
--- active/CVE-2010-1488 2010-05-05 21:42:32 UTC (rev 1824)
+++ active/CVE-2010-1488 2010-05-06 03:24:01 UTC (rev 1825)
@@ -1,12 +0,0 @@
-Candidate: CVE-2010-1488
-Description:
- oom: fix the unsafe usage of badness() in proc_oom_score()
-References:
- http://www.openwall.com/lists/oss-security/2010/04/14/1
-Notes:
-Bugs:
-upstream: released (2.6.34-rc4) [b95c35e7]
-2.6.32-upstream-stable: released (2.6.32.12) [e72f38d3]
-linux-2.6: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
-2.6.26-lenny-security: N/A "introduced in 2.6.32 commit 28b83c51"
-2.6.32-squeeze-security: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
Modified: active/CVE-2010-thinkpad-dos
===================================================================
--- active/CVE-2010-thinkpad-dos 2010-05-05 21:42:32 UTC (rev 1824)
+++ active/CVE-2010-thinkpad-dos 2010-05-06 03:24:01 UTC (rev 1825)
@@ -9,7 +9,7 @@
Bugs:
http://bugs.debian.org/565790
upstream: released (2.6.34-rc1) [b525c06c]
-2.6.32-upstream-stable: needed
-linux-2.6: needed
+2.6.32-upstream-stable: released (2.6.32.12) [1b0d63f1]
+linux-2.6: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
Copied: retired/CVE-2010-1488 (from rev 1824, active/CVE-2010-1488)
===================================================================
--- retired/CVE-2010-1488 (rev 0)
+++ retired/CVE-2010-1488 2010-05-06 03:24:01 UTC (rev 1825)
@@ -0,0 +1,12 @@
+Candidate: CVE-2010-1488
+Description:
+ oom: fix the unsafe usage of badness() in proc_oom_score()
+References:
+ http://www.openwall.com/lists/oss-security/2010/04/14/1
+Notes:
+Bugs:
+upstream: released (2.6.34-rc4) [b95c35e7]
+2.6.32-upstream-stable: released (2.6.32.12) [e72f38d3]
+linux-2.6: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
+2.6.26-lenny-security: N/A "introduced in 2.6.32 commit 28b83c51"
+2.6.32-squeeze-security: released (2.6.32-12) [bugfix/all/stable/2.6.32.12.patch]
More information about the kernel-sec-discuss
mailing list