[kernel-sec-discuss] r2226 - retired
Moritz Muehlenhoff
jmm at alioth.debian.org
Tue Mar 15 13:10:49 UTC 2011
Author: jmm
Date: 2011-03-15 13:10:36 +0000 (Tue, 15 Mar 2011)
New Revision: 2226
Modified:
retired/CVE-2010-4082
retired/CVE-2010-4083
retired/CVE-2010-4162
retired/CVE-2010-4165
retired/CVE-2010-4242
Log:
streamline data
Modified: retired/CVE-2010-4082
===================================================================
--- retired/CVE-2010-4082 2011-03-15 13:09:10 UTC (rev 2225)
+++ retired/CVE-2010-4082 2011-03-15 13:10:36 UTC (rev 2226)
@@ -1,9 +1,9 @@
Candidate: CVE-2010-4082
Description:
References:
-Notes: b4aaa78f4c2f9cde2f335b14f4ca30b01f9651ca
+Notes:
Bugs:
-upstream: released (2.6.36)
+upstream: released (2.6.36) [b4aaa78f4c2f9cde2f335b14f4ca30b01f9651ca]
2.6.32-upstream-stable: released (2.6.32.23)
linux-2.6: released (2.6.32-24)
2.6.26-lenny-security: N/A (vulnerable code not present)
Modified: retired/CVE-2010-4083
===================================================================
--- retired/CVE-2010-4083 2011-03-15 13:09:10 UTC (rev 2225)
+++ retired/CVE-2010-4083 2011-03-15 13:10:36 UTC (rev 2226)
@@ -1,9 +1,9 @@
Candidate: CVE-2010-4083
Description: system call stack leak
References:
-Notes: 982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56
+Notes:
Bugs:
-upstream: released (2.6.36)
+upstream: released (2.6.36) [982f7c2b2e6a28f8f266e075d92e19c0dd4c6e56]
2.6.32-upstream-stable: released (2.6.32.27)
linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch]
2.6.26-lenny-security: released (2.6.26-26lenny1) [bugfix/all/sys_semctl-fix-kernel-stack-leakage.patch]
Modified: retired/CVE-2010-4162
===================================================================
--- retired/CVE-2010-4162 2011-03-15 13:09:10 UTC (rev 2225)
+++ retired/CVE-2010-4162 2011-03-15 13:10:36 UTC (rev 2226)
@@ -1,7 +1,6 @@
Candidate: CVE-2010-4162
Description: DoS in block layer
References:
- http://git.kernel.org/?p=linux/kernel/git/axboe/linux-2.6-block.git;a=commitdiff;h=cb4644cac4a2797afc847e6c92736664d4b0ea34;hp=f3f63c1c28bc861a931fac283b5bc3585efb8967
Notes:
Bugs:
upstream: released (2.6.37) [cb4644cac4a2797afc847e6c92736664d4b0ea34]
Modified: retired/CVE-2010-4165
===================================================================
--- retired/CVE-2010-4165 2011-03-15 13:09:10 UTC (rev 2225)
+++ retired/CVE-2010-4165 2011-03-15 13:10:36 UTC (rev 2226)
@@ -2,12 +2,11 @@
Description:
References:
Notes:
- jmm> Introdruced in 2.6.28
jmm> Submitted to 2.6.32.x on 2010-01-12
jmm> we also need c39508d6f118308355468314ff414644115a07f3 for linux-2.6
Bugs:
upstream: released (2.6.37-rc2) [7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2]
2.6.32-upstream-stable: released (2.6.32.30)
linux-2.6: needed (2.6.32-28) [debian/patches/bugfix/all/tcp-Increase-TCP_MAXSEG-socket-option-minimum.patch]
-2.6.26-lenny-security: N/A
+2.6.26-lenny-security: N/A "Introduced in 2.6.28"
2.6.32-squeeze-security: released (2.6.32-31)
Modified: retired/CVE-2010-4242
===================================================================
--- retired/CVE-2010-4242 2011-03-15 13:09:10 UTC (rev 2225)
+++ retired/CVE-2010-4242 2011-03-15 13:10:36 UTC (rev 2226)
@@ -2,7 +2,6 @@
Description: missing tty ops write function presence check in hci_uart_tty_open()
References:
https://bugzilla.redhat.com/show_bug.cgi?id=641410
- http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773
Notes:
Bugs:
upstream: released (2.6.37) [c19483cc5e56ac5e22dd19cf25ba210ab1537773]
More information about the kernel-sec-discuss
mailing list