[kernel-sec-discuss] r3760 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sun Apr 26 11:52:23 UTC 2015


Author: carnil
Date: 2015-04-26 11:52:23 +0000 (Sun, 26 Apr 2015)
New Revision: 3760

Modified:
   active/CVE-2015-3331
   active/CVE-2015-3332
   active/CVE-2015-3339
Log:
Mark 3.16.7-ckt9-3~deb8u1 as released

Modified: active/CVE-2015-3331
===================================================================
--- active/CVE-2015-3331	2015-04-26 11:52:22 UTC (rev 3759)
+++ active/CVE-2015-3331	2015-04-26 11:52:23 UTC (rev 3760)
@@ -6,7 +6,7 @@
 upstream: released (v4.0-rc5) [ccfe8c3f7e52ae83155cb038753f4c75b774ca8a]
 2.6.32-upstream-stable: N/A "Introduced in v2.6.38-rc1 with 0bd82f5f6355775fbaf7d3c664432ce1b862be1e"
 sid: released (3.16.7-ckt9-3) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
-3.16-jessie-security: pending (3.16.7-ckt9-3~deb8u1) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
+3.16-jessie-security: released (3.16.7-ckt9-3~deb8u1) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
 2.6.32-squeeze-security: N/A "Introduced in v2.6.38-rc1 with 0bd82f5f6355775fbaf7d3c664432ce1b862be1e"
 3.16-upstream-stable: pending (3.16.7-ckt10)

Modified: active/CVE-2015-3332
===================================================================
--- active/CVE-2015-3332	2015-04-26 11:52:22 UTC (rev 3759)
+++ active/CVE-2015-3332	2015-04-26 11:52:23 UTC (rev 3760)
@@ -6,7 +6,7 @@
 upstream: N/A "Only affects < 3.18 kernels with 355a901e6cf1b2b763ec85caa2a9f04fbcc4ab4a backported"
 2.6.32-upstream-stable: N/A "355a901e6cf1b2b763ec85caa2a9f04fbcc4ab4a not backported"
 sid: released (3.16.7-ckt9-3) [bugfix/all/tcp-fix-crash-in-tcp-fast-open.patch]
-3.16-jessie-security: pending (3.16.7-ckt9-3~deb8u1) [bugfix/all/tcp-fix-crash-in-tcp-fast-open.patch]
+3.16-jessie-security: released (3.16.7-ckt9-3~deb8u1) [bugfix/all/tcp-fix-crash-in-tcp-fast-open.patch]
 3.2-wheezy-security: N/A "355a901e6cf1b2b763ec85caa2a9f04fbcc4ab4a not backported"
 2.6.32-squeeze-security: N/A "355a901e6cf1b2b763ec85caa2a9f04fbcc4ab4a not backported"
 3.16-upstream-stable: pending (3.16.7-ckt10)

Modified: active/CVE-2015-3339
===================================================================
--- active/CVE-2015-3339	2015-04-26 11:52:22 UTC (rev 3759)
+++ active/CVE-2015-3339	2015-04-26 11:52:23 UTC (rev 3760)
@@ -5,7 +5,7 @@
 upstream: pending [8b01fc86b9f425899f8a3a8fc1c47d73c2c20543]
 2.6.32-upstream-stable: needed
 sid: released (3.16.7-ckt9-3) [bugfix/all/fs-take-i_mutex-during-prepare_binprm-for-set-ug-id-.patch]
-3.16-jessie-security: pending (3.16.7-ckt9-3~deb8u1) [bugfix/all/fs-take-i_mutex-during-prepare_binprm-for-set-ug-id-.patch]
+3.16-jessie-security: released (3.16.7-ckt9-3~deb8u1) [bugfix/all/fs-take-i_mutex-during-prepare_binprm-for-set-ug-id-.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/all/fs-take-i_mutex-during-prepare_binprm-for-set-ug-id-.patch]
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: needed




More information about the kernel-sec-discuss mailing list