[kernel-sec-discuss] r3731 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Wed Apr 8 17:14:29 UTC 2015


Author: carnil
Date: 2015-04-08 17:14:29 +0000 (Wed, 08 Apr 2015)
New Revision: 3731

Modified:
   active/CVE-2014-8159
   active/CVE-2014-9710
   active/CVE-2015-0275
   active/CVE-2015-2041
   active/CVE-2015-2042
   active/CVE-2015-2150
   active/CVE-2015-2666
   active/CVE-2015-2830
   active/CVE-2015-2922
Log:
Mark some of the CVEs as released with 3.16.7-ckt9-1

Modified: active/CVE-2014-8159
===================================================================
--- active/CVE-2014-8159	2015-04-08 17:09:06 UTC (rev 3730)
+++ active/CVE-2014-8159	2015-04-08 17:14:29 UTC (rev 3731)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: needed
 2.6.32-upstream-stable: needed
-sid: pending (3.16.7-ckt9-1) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
+sid: released (3.16.7-ckt9-1) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: needed

Modified: active/CVE-2014-9710
===================================================================
--- active/CVE-2014-9710	2015-04-08 17:09:06 UTC (rev 3730)
+++ active/CVE-2014-9710	2015-04-08 17:14:29 UTC (rev 3731)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (3.19) [5f5bc6b1e2d5a6f827bc860ef2dc5b6f365d1339]
 2.6.32-upstream-stable:
-sid: pending (3.16.7-ckt9-1) [bugfix/all/btrfs-make-xattr-replace-operations-atomic.patch]
+sid: released (3.16.7-ckt9-1) [bugfix/all/btrfs-make-xattr-replace-operations-atomic.patch]
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.16-upstream-stable: needed

Modified: active/CVE-2015-0275
===================================================================
--- active/CVE-2015-0275	2015-04-08 17:09:06 UTC (rev 3730)
+++ active/CVE-2015-0275	2015-04-08 17:14:29 UTC (rev 3731)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: needed
 2.6.32-upstream-stable: N/A "vulnerable code not present"
-sid: pending (3.16.7-ckt9-1) [bugfix/all/ext4-allocate-entire-range-in-zero-range.patch, bugfix/all/ext4-fix-accidental-flag-aliasing-in-ext4_map_blocks.patch, bugfix/all/ext4-fix-zero_range-bug-hidden-by-flag-aliasing.patch]
+sid: released (3.16.7-ckt9-1) [bugfix/all/ext4-allocate-entire-range-in-zero-range.patch, bugfix/all/ext4-fix-accidental-flag-aliasing-in-ext4_map_blocks.patch, bugfix/all/ext4-fix-zero_range-bug-hidden-by-flag-aliasing.patch]
 3.2-wheezy-security: N/A "vulnerable code not present"
 2.6.32-squeeze-security: N/A "vulnerable code not present"
 3.16-upstream-stable: needed

Modified: active/CVE-2015-2041
===================================================================
--- active/CVE-2015-2041	2015-04-08 17:09:06 UTC (rev 3730)
+++ active/CVE-2015-2041	2015-04-08 17:14:29 UTC (rev 3731)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (v3.19-rc7) [6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49]
 2.6.32-upstream-stable: needed
-sid: pending (3.16.7-ckt9-1)
+sid: released (3.16.7-ckt9-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt8)

Modified: active/CVE-2015-2042
===================================================================
--- active/CVE-2015-2042	2015-04-08 17:09:06 UTC (rev 3730)
+++ active/CVE-2015-2042	2015-04-08 17:14:29 UTC (rev 3731)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (v3.19) [db27ebb111e9f69efece08e4cb6a34ff980f8896]
 2.6.32-upstream-stable: needed
-sid: pending (3.16.7-ckt9-1)
+sid: released (3.16.7-ckt9-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: released (3.16.7-ckt8)

Modified: active/CVE-2015-2150
===================================================================
--- active/CVE-2015-2150	2015-04-08 17:09:06 UTC (rev 3730)
+++ active/CVE-2015-2150	2015-04-08 17:14:29 UTC (rev 3731)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (4.0-rc4) [af6fc858a35b90e89ea7a7ee58e66628c55c776b]
 2.6.32-upstream-stable: N/A "xen-pciback introduced in 3.1"
-sid: pending (3.16.7-ckt9-1)
+sid: released (3.16.7-ckt9-1)
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: N/A "xen-pciback introduced in 3.1"
 3.16-upstream-stable: released (3.16.7-ckt9)

Modified: active/CVE-2015-2666
===================================================================
--- active/CVE-2015-2666	2015-04-08 17:09:06 UTC (rev 3730)
+++ active/CVE-2015-2666	2015-04-08 17:14:29 UTC (rev 3731)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (4.0) [f84598bd7c851f8b0bf8cd0d7c3be0d73c432ff4]
 2.6.32-upstream-stable: N/A "Introduced in 3.9 with ec400ddeff200b068ddc6c70f7321f49ecf32ed5"
-sid: pending (3.16.7-ckt9-1) [bugfix/x86/x86-microcode-intel-guard-against-stack-overflow-in-.patch]
+sid: released (3.16.7-ckt9-1) [bugfix/x86/x86-microcode-intel-guard-against-stack-overflow-in-.patch]
 3.2-wheezy-security: N/A "Introduced in 3.9 with ec400ddeff200b068ddc6c70f7321f49ecf32ed5"
 2.6.32-squeeze-security: N/A "Introduced in 3.9 with ec400ddeff200b068ddc6c70f7321f49ecf32ed5"
 3.16-upstream-stable: needed

Modified: active/CVE-2015-2830
===================================================================
--- active/CVE-2015-2830	2015-04-08 17:09:06 UTC (rev 3730)
+++ active/CVE-2015-2830	2015-04-08 17:14:29 UTC (rev 3731)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: (v4.0-rc3) [956421fbb74c3a6261903f3836c0740187cf038b]
 2.6.32-upstream-stable:
-sid: pending (3.16.7-ckt9-1)
+sid: released (3.16.7-ckt9-1)
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.16-upstream-stable: released (3.16.7-ckt9)

Modified: active/CVE-2015-2922
===================================================================
--- active/CVE-2015-2922	2015-04-08 17:09:06 UTC (rev 3730)
+++ active/CVE-2015-2922	2015-04-08 17:14:29 UTC (rev 3731)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: pending [6fd99094de2b83d1d4c8457f2c83483b2828e75a]
 2.6.32-upstream-stable:
-sid: pending (3.16.7-ckt9-1) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
+sid: released (3.16.7-ckt9-1) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
 3.2-wheezy-security:
 2.6.32-squeeze-security:
 3.16-upstream-stable: needed




More information about the kernel-sec-discuss mailing list