[kernel-sec-discuss] r2222 - active retired

Moritz Muehlenhoff jmm at alioth.debian.org
Fri Mar 11 11:23:09 UTC 2011


Author: jmm
Date: 2011-03-11 11:23:08 +0000 (Fri, 11 Mar 2011)
New Revision: 2222

Added:
   retired/CVE-2010-3699
   retired/CVE-2010-4165
   retired/CVE-2010-4656
   retired/CVE-2011-0521
   retired/CVE-2011-0712
Removed:
   active/CVE-2010-3699
   active/CVE-2010-4165
   active/CVE-2010-4656
   active/CVE-2011-0521
   active/CVE-2011-0712
Log:
retire issues


Deleted: active/CVE-2010-3699
===================================================================
--- active/CVE-2010-3699	2011-03-09 18:19:21 UTC (rev 2221)
+++ active/CVE-2010-3699	2011-03-11 11:23:08 UTC (rev 2222)
@@ -1,11 +0,0 @@
-Candidate: CVE-2010-3699
-Description:
-References:
- http://xenbits.xen.org/linux-2.6.18-xen.hg?rev/59f097ef181b
-Notes:
-Bugs:
-upstream: N/A "This affects the Xen feature patch set, not in upstream proper"
-2.6.32-upstream-stable: N/A "This affects the Xen feature patch set, not in upstream proper"
-linux-2.6: released (2.6.32-31)
-2.6.26-lenny-security: released (2.6.26-26lenny2) [features/all/xen/CVE-2010-3699.patch]
-2.6.32-squeeze-security: released (2.6.32-31)

Deleted: active/CVE-2010-4165
===================================================================
--- active/CVE-2010-4165	2011-03-09 18:19:21 UTC (rev 2221)
+++ active/CVE-2010-4165	2011-03-11 11:23:08 UTC (rev 2222)
@@ -1,13 +0,0 @@
-Candidate: CVE-2010-4165
-Description: 
-References:
-Notes:
- jmm> Introdruced in 2.6.28
- jmm> Submitted to 2.6.32.x on 2010-01-12
- jmm> we also need c39508d6f118308355468314ff414644115a07f3 for linux-2.6
-Bugs:
-upstream: released (2.6.37-rc2) [7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2]
-2.6.32-upstream-stable: released (2.6.32.30)
-linux-2.6: needed (2.6.32-28) [debian/patches/bugfix/all/tcp-Increase-TCP_MAXSEG-socket-option-minimum.patch]
-2.6.26-lenny-security: N/A
-2.6.32-squeeze-security: released (2.6.32-31)

Deleted: active/CVE-2010-4656
===================================================================
--- active/CVE-2010-4656	2011-03-09 18:19:21 UTC (rev 2221)
+++ active/CVE-2010-4656	2011-03-11 11:23:08 UTC (rev 2222)
@@ -1,11 +0,0 @@
-Candidate: CVE-2010-4656
-Description:
-References:
- http://www.openwall.com/lists/oss-security/2011/01/25/4
-Notes:
-Bugs:
-upstream: released (2.6.37) [3ed780117dbe5acb64280d218f0347f238dafed0]
-2.6.32-upstream-stable: released (2.6.32.32)
-linux-2.6: released (2.6.37-1)
-2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/usb-iowarrior-dont-trust-report_size-for-buffer-size.patch]
-2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/usb-iowarrior-dont-trust-report_size-for-buffer-size.patch]

Deleted: active/CVE-2011-0521
===================================================================
--- active/CVE-2011-0521	2011-03-09 18:19:21 UTC (rev 2221)
+++ active/CVE-2011-0521	2011-03-11 11:23:08 UTC (rev 2222)
@@ -1,12 +0,0 @@
-Candidate: CVE-2011-0521
-Description:
- av7110 negative array offset
-References:
- http://www.openwall.com/lists/oss-security/2011/01/24/2
-Notes:
-Bugs:
-upstream: released (2.6.38-rc2) [cb26a24ee9706473f31d34cc259f4dcf45cd0644]
-2.6.32-upstream-stable: released (2.6.32.30)
-linux-2.6: released (2.6.37-2)
-2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/av7110-check-for-negative-array-offset.patch]
-2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/av7110-check-for-negative-array-offset.patch]

Deleted: active/CVE-2011-0712
===================================================================
--- active/CVE-2011-0712	2011-03-09 18:19:21 UTC (rev 2221)
+++ active/CVE-2011-0712	2011-03-11 11:23:08 UTC (rev 2222)
@@ -1,10 +0,0 @@
-Candidate: CVE-2011-0712
-Description:
-References:
-Notes:
-Bugs:
-upstream: released (2.6.38-rc6) [eaae55dac6b64c0616046436b294e69fc5311581]
-2.6.32-upstream-stable: released (2.6.32.30)
-linux-2.6: released (2.6.37-2) [bugfix/all/stable/2.6.37.2.patch]
-2.6.26-lenny-security: needed
-2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/ALSA-caiaq-Fix-possible-string-buffer-overflow.patch]

Copied: retired/CVE-2010-3699 (from rev 2220, active/CVE-2010-3699)
===================================================================
--- retired/CVE-2010-3699	                        (rev 0)
+++ retired/CVE-2010-3699	2011-03-11 11:23:08 UTC (rev 2222)
@@ -0,0 +1,11 @@
+Candidate: CVE-2010-3699
+Description:
+References:
+ http://xenbits.xen.org/linux-2.6.18-xen.hg?rev/59f097ef181b
+Notes:
+Bugs:
+upstream: N/A "This affects the Xen feature patch set, not in upstream proper"
+2.6.32-upstream-stable: N/A "This affects the Xen feature patch set, not in upstream proper"
+linux-2.6: released (2.6.32-31)
+2.6.26-lenny-security: released (2.6.26-26lenny2) [features/all/xen/CVE-2010-3699.patch]
+2.6.32-squeeze-security: released (2.6.32-31)


Property changes on: retired/CVE-2010-3699
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2010-4165 (from rev 2220, active/CVE-2010-4165)
===================================================================
--- retired/CVE-2010-4165	                        (rev 0)
+++ retired/CVE-2010-4165	2011-03-11 11:23:08 UTC (rev 2222)
@@ -0,0 +1,13 @@
+Candidate: CVE-2010-4165
+Description: 
+References:
+Notes:
+ jmm> Introdruced in 2.6.28
+ jmm> Submitted to 2.6.32.x on 2010-01-12
+ jmm> we also need c39508d6f118308355468314ff414644115a07f3 for linux-2.6
+Bugs:
+upstream: released (2.6.37-rc2) [7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2]
+2.6.32-upstream-stable: released (2.6.32.30)
+linux-2.6: needed (2.6.32-28) [debian/patches/bugfix/all/tcp-Increase-TCP_MAXSEG-socket-option-minimum.patch]
+2.6.26-lenny-security: N/A
+2.6.32-squeeze-security: released (2.6.32-31)


Property changes on: retired/CVE-2010-4165
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2010-4656 (from rev 2220, active/CVE-2010-4656)
===================================================================
--- retired/CVE-2010-4656	                        (rev 0)
+++ retired/CVE-2010-4656	2011-03-11 11:23:08 UTC (rev 2222)
@@ -0,0 +1,11 @@
+Candidate: CVE-2010-4656
+Description:
+References:
+ http://www.openwall.com/lists/oss-security/2011/01/25/4
+Notes:
+Bugs:
+upstream: released (2.6.37) [3ed780117dbe5acb64280d218f0347f238dafed0]
+2.6.32-upstream-stable: released (2.6.32.32)
+linux-2.6: released (2.6.37-1)
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/usb-iowarrior-dont-trust-report_size-for-buffer-size.patch]
+2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/usb-iowarrior-dont-trust-report_size-for-buffer-size.patch]


Property changes on: retired/CVE-2010-4656
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2011-0521 (from rev 2220, active/CVE-2011-0521)
===================================================================
--- retired/CVE-2011-0521	                        (rev 0)
+++ retired/CVE-2011-0521	2011-03-11 11:23:08 UTC (rev 2222)
@@ -0,0 +1,12 @@
+Candidate: CVE-2011-0521
+Description:
+ av7110 negative array offset
+References:
+ http://www.openwall.com/lists/oss-security/2011/01/24/2
+Notes:
+Bugs:
+upstream: released (2.6.38-rc2) [cb26a24ee9706473f31d34cc259f4dcf45cd0644]
+2.6.32-upstream-stable: released (2.6.32.30)
+linux-2.6: released (2.6.37-2)
+2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/all/av7110-check-for-negative-array-offset.patch]
+2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/av7110-check-for-negative-array-offset.patch]


Property changes on: retired/CVE-2011-0521
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2011-0712 (from rev 2220, active/CVE-2011-0712)
===================================================================
--- retired/CVE-2011-0712	                        (rev 0)
+++ retired/CVE-2011-0712	2011-03-11 11:23:08 UTC (rev 2222)
@@ -0,0 +1,10 @@
+Candidate: CVE-2011-0712
+Description:
+References:
+Notes:
+Bugs:
+upstream: released (2.6.38-rc6) [eaae55dac6b64c0616046436b294e69fc5311581]
+2.6.32-upstream-stable: released (2.6.32.30)
+linux-2.6: released (2.6.37-2) [bugfix/all/stable/2.6.37.2.patch]
+2.6.26-lenny-security: needed
+2.6.32-squeeze-security: released (2.6.32-31) [bugfix/all/ALSA-caiaq-Fix-possible-string-buffer-overflow.patch]


Property changes on: retired/CVE-2011-0712
___________________________________________________________________
Added: svn:mergeinfo
   + 




More information about the kernel-sec-discuss mailing list