[kernel-sec-discuss] r2835 - active retired

Ben Hutchings benh at alioth.debian.org
Wed Feb 27 14:55:04 UTC 2013


Author: benh
Date: 2013-02-27 14:54:42 +0000 (Wed, 27 Feb 2013)
New Revision: 2835

Added:
   retired/CVE-2013-0309
   retired/CVE-2013-0310
Removed:
   active/CVE-2013-0309
   active/CVE-2013-0310
Log:
Retire CVE-2013-0309 and CVE-201-0310, released or unneeded in alll branches

Deleted: active/CVE-2013-0309
===================================================================
--- active/CVE-2013-0309	2013-02-27 14:50:45 UTC (rev 2834)
+++ active/CVE-2013-0309	2013-02-27 14:54:42 UTC (rev 2835)
@@ -1,10 +0,0 @@
-Description: mm: thp: fix pmd_present for split_huge_page and PROT_NONE with THP
-References:
- https://bugzilla.redhat.com/show_bug.cgi?id=912898
-Notes:
-Bugs:
-upstream: released (3.7) [027ef6c8]
-2.6.32-upstream-stable: N/A "no THP support"
-sid: released (3.2.32-1)
-2.6.32-squeeze-security: N/A "no THP support"
-3.2-upstream-stable: released (3.2.32)

Deleted: active/CVE-2013-0310
===================================================================
--- active/CVE-2013-0310	2013-02-27 14:50:45 UTC (rev 2834)
+++ active/CVE-2013-0310	2013-02-27 14:54:42 UTC (rev 2835)
@@ -1,12 +0,0 @@
-Description: cipso: don't follow a NULL pointer when setsockopt() is called
-References:
- https://bugzilla.redhat.com/show_bug.cgi?id=912900
-Notes:
- jmm> Not activated in Wheezy kernel, only affects local builds with different options
- bwh> Same for squeeze and experimental
-Bugs:
-upstream: released (3.6) [89d7ae34cdda4195809a5a987f697a517a2a3177]
-2.6.32-upstream-stable: released (2.6.32.60)
-sid: released (3.2.29-1)
-2.6.32-squeeze-security: released (2.6.3-48)
-3.2-upstream-stable: released (3.2.28)

Copied: retired/CVE-2013-0309 (from rev 2834, active/CVE-2013-0309)
===================================================================
--- retired/CVE-2013-0309	                        (rev 0)
+++ retired/CVE-2013-0309	2013-02-27 14:54:42 UTC (rev 2835)
@@ -0,0 +1,10 @@
+Description: mm: thp: fix pmd_present for split_huge_page and PROT_NONE with THP
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=912898
+Notes:
+Bugs:
+upstream: released (3.7) [027ef6c8]
+2.6.32-upstream-stable: N/A "no THP support"
+sid: released (3.2.32-1)
+2.6.32-squeeze-security: N/A "no THP support"
+3.2-upstream-stable: released (3.2.32)

Copied: retired/CVE-2013-0310 (from rev 2834, active/CVE-2013-0310)
===================================================================
--- retired/CVE-2013-0310	                        (rev 0)
+++ retired/CVE-2013-0310	2013-02-27 14:54:42 UTC (rev 2835)
@@ -0,0 +1,12 @@
+Description: cipso: don't follow a NULL pointer when setsockopt() is called
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=912900
+Notes:
+ jmm> Not activated in Wheezy kernel, only affects local builds with different options
+ bwh> Same for squeeze and experimental
+Bugs:
+upstream: released (3.6) [89d7ae34cdda4195809a5a987f697a517a2a3177]
+2.6.32-upstream-stable: released (2.6.32.60)
+sid: released (3.2.29-1)
+2.6.32-squeeze-security: released (2.6.3-48)
+3.2-upstream-stable: released (3.2.28)




More information about the kernel-sec-discuss mailing list