[kernel-sec-discuss] r3080 - active retired

Moritz Muehlenhoff jmm at alioth.debian.org
Wed Sep 4 13:00:58 UTC 2013


Author: jmm
Date: 2013-09-04 13:00:36 +0000 (Wed, 04 Sep 2013)
New Revision: 3080

Added:
   retired/CVE-2013-1956
   retired/CVE-2013-1957
   retired/CVE-2013-1958
Removed:
   active/CVE-2013-1956
   active/CVE-2013-1957
   active/CVE-2013-1958
Log:
retire


Deleted: active/CVE-2013-1956
===================================================================
--- active/CVE-2013-1956	2013-09-04 12:58:23 UTC (rev 3079)
+++ active/CVE-2013-1956	2013-09-04 13:00:36 UTC (rev 3080)
@@ -1,10 +0,0 @@
-Description: userns: Don't allow creation if the user is chrooted
-References:
-Notes:
-Bugs:
-upstream: released (3.9) [3151527ee007b73a0ebd296010f1c0454a919c7d]
-2.6.32-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
-sid: released (3.8.11-1)
-3.2-wheezy-security: N/A "user namespaces cannot be created by unprivileged users in 3.2"
-2.6.32-squeeze-security: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
-3.2-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 3.2"

Deleted: active/CVE-2013-1957
===================================================================
--- active/CVE-2013-1957	2013-09-04 12:58:23 UTC (rev 3079)
+++ active/CVE-2013-1957	2013-09-04 13:00:36 UTC (rev 3080)
@@ -1,10 +0,0 @@
-Description: vfs: Carefully propogate mounts across user namespaces
-References:
-Notes:
-Bugs:
-upstream: released (3.9) [90563b198e4c6674c63672fae1923da467215f45, 132c94e31b8bca8ea921f9f96a57d684fa4ae0a9]
-2.6.32-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
-sid: released (3.8.11-1)
-3.2-wheezy-security: N/A "user namespaces cannot be created by unprivileged users in 3.2"
-2.6.32-squeeze-security: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
-3.2-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 3.2"

Deleted: active/CVE-2013-1958
===================================================================
--- active/CVE-2013-1958	2013-09-04 12:58:23 UTC (rev 3079)
+++ active/CVE-2013-1958	2013-09-04 13:00:36 UTC (rev 3080)
@@ -1,10 +0,0 @@
-Description: scm: Require CAP_SYS_ADMIN over the current pidns to spoof pids
-References:
-Notes:
-Bugs:
-upstream: released (3.9) [92f28d973cce45ef5823209aab3138eb45d8b349]
-2.6.32-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
-sid: released (3.8.11-1)
-3.2-wheezy-security: N/A "user namespaces cannot be created by unprivileged users in 3.2"
-2.6.32-squeeze-security: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
-3.2-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 3.2"

Copied: retired/CVE-2013-1956 (from rev 3079, active/CVE-2013-1956)
===================================================================
--- retired/CVE-2013-1956	                        (rev 0)
+++ retired/CVE-2013-1956	2013-09-04 13:00:36 UTC (rev 3080)
@@ -0,0 +1,10 @@
+Description: userns: Don't allow creation if the user is chrooted
+References:
+Notes:
+Bugs:
+upstream: released (3.9) [3151527ee007b73a0ebd296010f1c0454a919c7d]
+2.6.32-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
+sid: released (3.8.11-1)
+3.2-wheezy-security: N/A "user namespaces cannot be created by unprivileged users in 3.2"
+2.6.32-squeeze-security: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
+3.2-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 3.2"


Property changes on: retired/CVE-2013-1956
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2013-1957 (from rev 3079, active/CVE-2013-1957)
===================================================================
--- retired/CVE-2013-1957	                        (rev 0)
+++ retired/CVE-2013-1957	2013-09-04 13:00:36 UTC (rev 3080)
@@ -0,0 +1,10 @@
+Description: vfs: Carefully propogate mounts across user namespaces
+References:
+Notes:
+Bugs:
+upstream: released (3.9) [90563b198e4c6674c63672fae1923da467215f45, 132c94e31b8bca8ea921f9f96a57d684fa4ae0a9]
+2.6.32-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
+sid: released (3.8.11-1)
+3.2-wheezy-security: N/A "user namespaces cannot be created by unprivileged users in 3.2"
+2.6.32-squeeze-security: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
+3.2-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 3.2"


Property changes on: retired/CVE-2013-1957
___________________________________________________________________
Added: svn:mergeinfo
   + 

Copied: retired/CVE-2013-1958 (from rev 3079, active/CVE-2013-1958)
===================================================================
--- retired/CVE-2013-1958	                        (rev 0)
+++ retired/CVE-2013-1958	2013-09-04 13:00:36 UTC (rev 3080)
@@ -0,0 +1,10 @@
+Description: scm: Require CAP_SYS_ADMIN over the current pidns to spoof pids
+References:
+Notes:
+Bugs:
+upstream: released (3.9) [92f28d973cce45ef5823209aab3138eb45d8b349]
+2.6.32-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
+sid: released (3.8.11-1)
+3.2-wheezy-security: N/A "user namespaces cannot be created by unprivileged users in 3.2"
+2.6.32-squeeze-security: N/A "user namespaces cannot be created by unprivileged users in 2.6.32"
+3.2-upstream-stable: N/A "user namespaces cannot be created by unprivileged users in 3.2"


Property changes on: retired/CVE-2013-1958
___________________________________________________________________
Added: svn:mergeinfo
   + 




More information about the kernel-sec-discuss mailing list