[kernel-sec-discuss] r3893 - active retired
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Fri Aug 7 13:52:17 UTC 2015
Author: jmm
Date: 2015-08-07 13:52:17 +0000 (Fri, 07 Aug 2015)
New Revision: 3893
Added:
retired/CVE-2015-4692
Removed:
active/CVE-2015-4692
Log:
retire
Deleted: active/CVE-2015-4692
===================================================================
--- active/CVE-2015-4692 2015-08-07 13:51:36 UTC (rev 3892)
+++ active/CVE-2015-4692 2015-08-07 13:52:17 UTC (rev 3893)
@@ -1,14 +0,0 @@
-Description: kvm: x86: NULL pointer dereference in kvm_apic_has_events function
-References:
-Notes:
- Introduced by 66450a21f99636af4fafac2afd33f1a40631bc3a (v3.10-rc1)
- https://lkml.org/lkml/2015/6/4/163
-Bugs:
-upstream: released (4.2-rc1) [ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009]
-3.16-upstream-stable: released (3.16.7-ckt15)
-3.2-upstream-stable: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
-2.6.32-upstream-stable: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
-sid: released (4.0.8-1) [bugfix/x86/kvm-x86-fix-kvm_apic_has_events-to-check-for-null-po.patch]
-3.16-jessie-security: released (3.16.7-ckt11+deb8u3) [bugfix/x86/kvm-x86-fix-kvm_apic_has_events-to-check-for-null-po.patch]
-3.2-wheezy-security: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
-2.6.32-squeeze-security: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
Copied: retired/CVE-2015-4692 (from rev 3886, active/CVE-2015-4692)
===================================================================
--- retired/CVE-2015-4692 (rev 0)
+++ retired/CVE-2015-4692 2015-08-07 13:52:17 UTC (rev 3893)
@@ -0,0 +1,14 @@
+Description: kvm: x86: NULL pointer dereference in kvm_apic_has_events function
+References:
+Notes:
+ Introduced by 66450a21f99636af4fafac2afd33f1a40631bc3a (v3.10-rc1)
+ https://lkml.org/lkml/2015/6/4/163
+Bugs:
+upstream: released (4.2-rc1) [ce40cd3fc7fa40a6119e5fe6c0f2bc0eb4541009]
+3.16-upstream-stable: released (3.16.7-ckt15)
+3.2-upstream-stable: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
+2.6.32-upstream-stable: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
+sid: released (4.0.8-1) [bugfix/x86/kvm-x86-fix-kvm_apic_has_events-to-check-for-null-po.patch]
+3.16-jessie-security: released (3.16.7-ckt11+deb8u3) [bugfix/x86/kvm-x86-fix-kvm_apic_has_events-to-check-for-null-po.patch]
+3.2-wheezy-security: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
+2.6.32-squeeze-security: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
More information about the kernel-sec-discuss
mailing list