[kernel-sec-discuss] r2662 - active retired

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Apr 2 08:40:23 UTC 2012


Author: jmm
Date: 2012-04-02 08:40:21 +0000 (Mon, 02 Apr 2012)
New Revision: 2662

Added:
   retired/CVE-2009-4307
   retired/CVE-2012-1097
Removed:
   active/CVE-2009-4307
   active/CVE-2012-1097
Log:
retire two issues


Deleted: active/CVE-2009-4307
===================================================================
--- active/CVE-2009-4307	2012-04-02 08:40:01 UTC (rev 2661)
+++ active/CVE-2009-4307	2012-04-02 08:40:21 UTC (rev 2662)
@@ -1,14 +0,0 @@
-Candidate: CVE-2009-4307
-Description:
-References:
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4307
-Notes:
-Bugs:
-upstream: pending (2.6.33-rc1) [503358ae]
-2.6.31-upstream-stable: released (2.6.31.8) [a7aaaff9]
-2.6.32-upstream-stable: released (2.6.32.1) [8ed33ff5]
-linux-2.6: released (2.6.32-2)
-2.6.18-etch-security: N/A "introduced in 2.6.27 commit 772cb7c8"
-2.6.24-etch-security: N/A "introduced in 2.6.27 commit 772cb7c8"
-2.6.26-lenny-security: N/A "introduced in 2.6.27 commit 772cb7c8"
-2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/ext4-fix-undefined-behavior-in-ext4_fill_flex_info.patch] "fix in 2.6.32-2 was incomplete"

Deleted: active/CVE-2012-1097
===================================================================
--- active/CVE-2012-1097	2012-04-02 08:40:01 UTC (rev 2661)
+++ active/CVE-2012-1097	2012-04-02 08:40:21 UTC (rev 2662)
@@ -1,10 +0,0 @@
-Description: regset: Prevent null pointer reference on readonly regsets
-References:
-Notes:
- jmm> Introduced in 2.6.25
- bwh> first read-only regset was introduced in 2.6.28
-Bugs:
-upstream: released (3.3-rc6) [c8e252586f8d5de906385d8cf6385fee289a825e, 5189fa19a4b2b4c3bec37c3a019d446148827717]
-2.6.32-upstream-stable: released (2.6.32.59)
-sid: released (3.2.10-1)
-2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/regset-Prevent-null-pointer-reference-on-readonly-re.patch]

Copied: retired/CVE-2009-4307 (from rev 2659, active/CVE-2009-4307)
===================================================================
--- retired/CVE-2009-4307	                        (rev 0)
+++ retired/CVE-2009-4307	2012-04-02 08:40:21 UTC (rev 2662)
@@ -0,0 +1,14 @@
+Candidate: CVE-2009-4307
+Description:
+References:
+ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4307
+Notes:
+Bugs:
+upstream: pending (2.6.33-rc1) [503358ae]
+2.6.31-upstream-stable: released (2.6.31.8) [a7aaaff9]
+2.6.32-upstream-stable: released (2.6.32.1) [8ed33ff5]
+linux-2.6: released (2.6.32-2)
+2.6.18-etch-security: N/A "introduced in 2.6.27 commit 772cb7c8"
+2.6.24-etch-security: N/A "introduced in 2.6.27 commit 772cb7c8"
+2.6.26-lenny-security: N/A "introduced in 2.6.27 commit 772cb7c8"
+2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/ext4-fix-undefined-behavior-in-ext4_fill_flex_info.patch] "fix in 2.6.32-2 was incomplete"


Property changes on: retired/CVE-2009-4307
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2012-1097 (from rev 2661, active/CVE-2012-1097)
===================================================================
--- retired/CVE-2012-1097	                        (rev 0)
+++ retired/CVE-2012-1097	2012-04-02 08:40:21 UTC (rev 2662)
@@ -0,0 +1,10 @@
+Description: regset: Prevent null pointer reference on readonly regsets
+References:
+Notes:
+ jmm> Introduced in 2.6.25
+ bwh> first read-only regset was introduced in 2.6.28
+Bugs:
+upstream: released (3.3-rc6) [c8e252586f8d5de906385d8cf6385fee289a825e, 5189fa19a4b2b4c3bec37c3a019d446148827717]
+2.6.32-upstream-stable: released (2.6.32.59)
+sid: released (3.2.10-1)
+2.6.32-squeeze-security: released (2.6.32-41squeeze1) [bugfix/all/regset-Prevent-null-pointer-reference-on-readonly-re.patch]


Property changes on: retired/CVE-2012-1097
___________________________________________________________________
Added: svn:mergeinfo
   + 




More information about the kernel-sec-discuss mailing list