summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2011-03-11 15:27:27 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2011-03-11 15:27:27 +0000
commit09b47930087793199e1ee985d797b793ec730441 (patch)
treea2edec63ef1b04214be1794e03b81b8d7d7ca168
parent3dbd00548e069ad07d637f46c2af2686122d9524 (diff)
streamline upstream commits
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2224 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r--retired/CVE-2010-38491
-rw-r--r--retired/CVE-2010-38501
-rw-r--r--retired/CVE-2010-38583
-rw-r--r--retired/CVE-2010-38733
-rw-r--r--retired/CVE-2010-39042
-rw-r--r--retired/CVE-2010-40743
6 files changed, 4 insertions, 9 deletions
diff --git a/retired/CVE-2010-3849 b/retired/CVE-2010-3849
index fec9b24e..64f350b8 100644
--- a/retired/CVE-2010-3849
+++ b/retired/CVE-2010-3849
@@ -1,7 +1,6 @@
Candidate: CVE-2010-3849
Description:
References:
- http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=fa0e846494792e722d817b9d3d625a4ef4896c96
Notes:
Bugs:
upstream: released (2.6.37-rc4) [fa0e846494792e722d817b9d3d625a4ef4896c96]
diff --git a/retired/CVE-2010-3850 b/retired/CVE-2010-3850
index 11292f14..59f3735b 100644
--- a/retired/CVE-2010-3850
+++ b/retired/CVE-2010-3850
@@ -1,7 +1,6 @@
Candidate: CVE-2010-3850
Description:
References:
- http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=16c41745c7b92a243d0874f534c1655196c64b74
Notes:
Bugs:
upstream: released (2.6.37-rc4) [16c41745c7b92a243d0874f534c1655196c64b74]
diff --git a/retired/CVE-2010-3858 b/retired/CVE-2010-3858
index ef164d6c..8e8d9411 100644
--- a/retired/CVE-2010-3858
+++ b/retired/CVE-2010-3858
@@ -7,9 +7,8 @@ References:
Notes:
related to CVE-2010-2240, but supposedly not completely fixed by the patches for that:
http://lists.immunitysec.com/pipermail/dailydave/2010-August/006171.html (5th paragraph)
- jmm> 1b528181b2ffa14721fb28ad1bd539fe1732c583
Bugs:
-upstream: released (2.6.36)
+upstream: released (2.6.36) [1b528181b2ffa14721fb28ad1bd539fe1732c583]
2.6.32-upstream-stable: released (2.6.32.25)
linux-2.6: released (2.6.32-27) [bugfix/all/stable/2.6.32.25.patch]
2.6.26-lenny-security: released (2.6.26-26lenny1) [bugfix/all/setup_arg_pages-diagnose-excessive-argument-size.patch]
diff --git a/retired/CVE-2010-3873 b/retired/CVE-2010-3873
index 79784b13..ffe629f0 100644
--- a/retired/CVE-2010-3873
+++ b/retired/CVE-2010-3873
@@ -4,9 +4,8 @@ References:
http://marc.info/?l=linux-netdev&m=128871017529408&w=2
http://marc.info/?l=linux-netdev&m=128882490708019&w=2
Notes:
- jmm> a6331d6f9a4298173b413cf99a40cc86a9d92c37
Bugs:
-upstream: released (2.6.37-rc2)
+upstream: released (2.6.37-rc2) [a6331d6f9a4298173b413cf99a40cc86a9d92c37]
2.6.32-upstream-stable: released (2.6.32.27)
linux-2.6: released (2.6.32-28) [bugfix/all/x25-Patch-to-fix-bug-15678-x25-accesses-fields-beyon.patch, bugfix/all/x25-memory-corruption-in-X.25-facilities-parsing.patch]
2.6.26-lenny-security: released (2.6.26-26lenny1) [bugfix/all/x25-fix-field-accesses-beyond-end-of-packet.patch, bugfix/all/x25-fix-memory-corruption-in-facilities-parsing.patch]
diff --git a/retired/CVE-2010-3904 b/retired/CVE-2010-3904
index a0dae42d..7548bd4f 100644
--- a/retired/CVE-2010-3904
+++ b/retired/CVE-2010-3904
@@ -3,7 +3,7 @@ Description:
References:
Notes:
Bugs:
-upstream: released (2.6.36)
+upstream: released (2.6.36) [799c10559d60f159ab2232203f222f18fa3c4a5f]
2.6.32-upstream-stable: released (2.6.32.25)
linux-2.6: released (2.6.32-26)
2.6.26-lenny-security: N/A (Introduced in 2.6.30)
diff --git a/retired/CVE-2010-4074 b/retired/CVE-2010-4074
index 4103a708..8ea06c22 100644
--- a/retired/CVE-2010-4074
+++ b/retired/CVE-2010-4074
@@ -2,9 +2,8 @@ Candidate: CVE-2010-4074
Description: TIOCGICOUNT leak
References:
Notes:
- jmm> a0846f1868b11cd827bdfeaf4527d8b1b1c0b098
Bugs:
-upstream: released (2.6.36)
+upstream: released (2.6.36) [a0846f1868b11cd827bdfeaf4527d8b1b1c0b098]
2.6.32-upstream-stable: released (2.6.32.23)
linux-2.6: released (2.6.32-24)
2.6.26-lenny-security: released (2.6.26-26lenny1) [bugfix/all/usb-serial-mosfoo-prevent-reading-uninitialized-stack-memory.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy