[kernel-sec-discuss] r1826 - active retired

Michael Gilbert gilbert-guest at alioth.debian.org
Thu May 6 03:52:15 UTC 2010


Author: gilbert-guest
Date: 2010-05-06 03:52:15 +0000 (Thu, 06 May 2010)
New Revision: 1826

Added:
   retired/CVE-2009-mmap_min_addr-bypass
Removed:
   active/CVE-2009-mmap_min_addr-bypass
Modified:
   active/CVE-2009-tty-null-ptr-dereference
Log:
more updates

Deleted: active/CVE-2009-mmap_min_addr-bypass
===================================================================
--- active/CVE-2009-mmap_min_addr-bypass	2010-05-06 03:24:01 UTC (rev 1825)
+++ active/CVE-2009-mmap_min_addr-bypass	2010-05-06 03:52:15 UTC (rev 1826)
@@ -1,14 +0,0 @@
-Candidate:
-Description:
- processes with CAP_SYS_RAWIO could bypass selinux mmapm_min_addr
-References:
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;f=security/min_addr.c;fp=security/min_addr.c;h=fc43c9d37084599056680e55c5e8c38491b117ba;hp=c844eed7915d0d270c058c16d6b3db40ffa576d0;hb=83fdbfbfe6e7e8906e3a3f8f6bc074d887e92109;hpb=d9b2c4d0b03c721808c0d259e43a27f1e80205bc
-Notes:
-Bugs:
-upstream: released (2.6.33) [0e1a6ef2]
-2.6.32-upstream-stable: needed
-linux-2.6: needed
-2.6.18-etch-security: N/A "introduced in 2.6.31 commit 788084a"
-2.6.24-etch-security: N/A "introduced in 2.6.31 commit 788084a"
-2.6.26-lenny-security: N/A "introduced in 2.6.31 commit 788084a"
-2.6.32-squeeze-security: needed

Modified: active/CVE-2009-tty-null-ptr-dereference
===================================================================
--- active/CVE-2009-tty-null-ptr-dereference	2010-05-06 03:24:01 UTC (rev 1825)
+++ active/CVE-2009-tty-null-ptr-dereference	2010-05-06 03:52:15 UTC (rev 1826)
@@ -7,8 +7,8 @@
 Notes:
  supposedly fixed in redhat kernels (see bug report above)
 Bugs:
-upstream: needed
-2.6.32-upstream-stable: needed
-linux-2.6: needed
+upstream: released (2.6.33) [70362511] 
+2.6.32-upstream-stable: released (2.6.32.6) [179b7e53]
+linux-2.6: released (2.6.32-6) [bugfix/all/stable/2.6.32.6.patch]
 2.6.26-lenny-security: needed
-2.6.32-squeeze-security: needed
+2.6.32-squeeze-security: released (2.6.32-6) [bugfix/all/stable/2.6.32.6.patch]

Copied: retired/CVE-2009-mmap_min_addr-bypass (from rev 1825, active/CVE-2009-mmap_min_addr-bypass)
===================================================================
--- retired/CVE-2009-mmap_min_addr-bypass	                        (rev 0)
+++ retired/CVE-2009-mmap_min_addr-bypass	2010-05-06 03:52:15 UTC (rev 1826)
@@ -0,0 +1,14 @@
+Candidate:
+Description:
+ processes with CAP_SYS_RAWIO could bypass selinux mmapm_min_addr
+References:
+ http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;f=security/min_addr.c;fp=security/min_addr.c;h=fc43c9d37084599056680e55c5e8c38491b117ba;hp=c844eed7915d0d270c058c16d6b3db40ffa576d0;hb=83fdbfbfe6e7e8906e3a3f8f6bc074d887e92109;hpb=d9b2c4d0b03c721808c0d259e43a27f1e80205bc
+Notes:
+Bugs:
+upstream: released (2.6.33) [0e1a6ef2]
+2.6.32-upstream-stable: released (2.6.32.11) [c907edc6]
+linux-2.6: released (2.6.32-11) [bugfix/all/stable/2.6.32.11.patch]
+2.6.18-etch-security: N/A "introduced in 2.6.31 commit 788084a"
+2.6.24-etch-security: N/A "introduced in 2.6.31 commit 788084a"
+2.6.26-lenny-security: N/A "introduced in 2.6.31 commit 788084a"
+2.6.32-squeeze-security: released (2.6.32-11) [bugfix/all/stable/2.6.32.11.patch]




More information about the kernel-sec-discuss mailing list