[kernel-sec-discuss] r3364 - active retired

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed Jun 4 14:26:36 UTC 2014


Author: jmm
Date: 2014-06-04 14:26:36 +0000 (Wed, 04 Jun 2014)
New Revision: 3364

Added:
   retired/CVE-2013-4592
Removed:
   active/CVE-2013-4592
Log:
retire


Deleted: active/CVE-2013-4592
===================================================================
--- active/CVE-2013-4592	2014-06-04 14:25:51 UTC (rev 3363)
+++ active/CVE-2013-4592	2014-06-04 14:26:36 UTC (rev 3364)
@@ -1,10 +0,0 @@
-Description: KVM: DoS through unreclaimable memory
-References:
-Notes:
-Bugs:
-upstream: released (3.8) [e40f193f5bb022e927a57a4f5d5194e4f12ddb74, 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8]
-2.6.32-upstream-stable: ignored "too intrusive to backport"
-sid: released (3.8-1)
-3.2-wheezy-security: released (3.2.53-1) [bugfix/all/KVM-perform-an-invalid-memslot-step-for-gpa-base-cha.patch, bugfix/all/KVM-Fix-iommu-map-unmap-to-handle-memory-slot-moves.patch]
-2.6.32-squeeze-security: ignored "too intrusive to backport"
-3.2-upstream-stable: released (3.2.54)

Copied: retired/CVE-2013-4592 (from rev 3363, active/CVE-2013-4592)
===================================================================
--- retired/CVE-2013-4592	                        (rev 0)
+++ retired/CVE-2013-4592	2014-06-04 14:26:36 UTC (rev 3364)
@@ -0,0 +1,10 @@
+Description: KVM: DoS through unreclaimable memory
+References:
+Notes:
+Bugs:
+upstream: released (3.8) [e40f193f5bb022e927a57a4f5d5194e4f12ddb74, 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8]
+2.6.32-upstream-stable: ignored "too intrusive to backport"
+sid: released (3.8-1)
+3.2-wheezy-security: released (3.2.53-1) [bugfix/all/KVM-perform-an-invalid-memslot-step-for-gpa-base-cha.patch, bugfix/all/KVM-Fix-iommu-map-unmap-to-handle-memory-slot-moves.patch]
+2.6.32-squeeze-security: ignored "too intrusive to backport"
+3.2-upstream-stable: released (3.2.54)


Property changes on: retired/CVE-2013-4592
___________________________________________________________________
Added: svn:mergeinfo
   + 




More information about the kernel-sec-discuss mailing list