[kernel-sec-discuss] r3886 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Fri Aug 7 06:56:24 UTC 2015
Author: carnil
Date: 2015-08-07 06:56:23 +0000 (Fri, 07 Aug 2015)
New Revision: 3886
Modified:
active/CVE-2015-1333
active/CVE-2015-3212
active/CVE-2015-4692
active/CVE-2015-4700
active/CVE-2015-5364
active/CVE-2015-5366
active/CVE-2015-5697
active/CVE-2015-5706
active/CVE-2015-5707
Log:
Mark CVEs are released for wheezy and jessie for DSA-3329-1
Modified: active/CVE-2015-1333
===================================================================
--- active/CVE-2015-1333 2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-1333 2015-08-07 06:56:23 UTC (rev 3886)
@@ -10,6 +10,6 @@
3.2-upstream-stable: N/A ("Vulnerable code not present")
2.6.32-upstream-stable: N/A ("Vulnerable code not present")
sid: released (4.1.3-1) [bugfix/all/keys-ensure-we-free-the-assoc-array-edit-if-edit-is-valid.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u3) [bugfix/all/keys-ensure-we-free-the-assoc-array-edit-if-edit-is-valid.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/keys-ensure-we-free-the-assoc-array-edit-if-edit-is-valid.patch]
3.2-wheezy-security: N/A ("Vulnerable code not present")
2.6.32-squeeze-security: N/A ("Vulnerable code not present")
Modified: active/CVE-2015-3212
===================================================================
--- active/CVE-2015-3212 2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-3212 2015-08-07 06:56:23 UTC (rev 3886)
@@ -9,6 +9,6 @@
3.2-upstream-stable: pending (3.2.70) [sctp-fix-asconf-list-handling.patch]
2.6.32-upstream-stable: N/A "Introduced with 9f7d653b67aed2d92540fbb0a8adaf"
sid: released (4.0.8-1)
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u3) [bugfix/all/sctp-fix-asconf-list-handling.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/all/sctp-fix-asconf-list-handling.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/sctp-fix-asconf-list-handling.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/sctp-fix-asconf-list-handling.patch]
2.6.32-squeeze-security: N/A "Introduced with 9f7d653b67aed2d92540fbb0a8adaf"
Modified: active/CVE-2015-4692
===================================================================
--- active/CVE-2015-4692 2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-4692 2015-08-07 06:56:23 UTC (rev 3886)
@@ -9,6 +9,6 @@
3.2-upstream-stable: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
2.6.32-upstream-stable: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
sid: released (4.0.8-1) [bugfix/x86/kvm-x86-fix-kvm_apic_has_events-to-check-for-null-po.patch]
-3.16-jessie-security: pending (3.16.7-ckt11+deb8u3) [bugfix/x86/kvm-x86-fix-kvm_apic_has_events-to-check-for-null-po.patch]
+3.16-jessie-security: released (3.16.7-ckt11+deb8u3) [bugfix/x86/kvm-x86-fix-kvm_apic_has_events-to-check-for-null-po.patch]
3.2-wheezy-security: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
2.6.32-squeeze-security: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
Modified: active/CVE-2015-4700
===================================================================
--- active/CVE-2015-4700 2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-4700 2015-08-07 06:56:23 UTC (rev 3886)
@@ -9,6 +9,6 @@
3.2-upstream-stable: pending (3.2.70) [x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
2.6.32-upstream-stable: N/A "Introduced in 3.0 with 0a14842f5a3c0e88a1e59fac5c3025db39721f74"
sid: released (4.0.7-1)
-3.16-jessie-security: pending (3.16.7-ckt11+deb8u3) [bugfix/x86/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/x86/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
+3.16-jessie-security: released (3.16.7-ckt11+deb8u3) [bugfix/x86/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/x86/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
2.6.32-squeeze-security: N/A "Introduced in 3.0 with 0a14842f5a3c0e88a1e59fac5c3025db39721f74"
Modified: active/CVE-2015-5364
===================================================================
--- active/CVE-2015-5364 2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-5364 2015-08-07 06:56:23 UTC (rev 3886)
@@ -8,5 +8,5 @@
2.6.32-upstream-stable: pending (2.6.32.68)
sid: released (4.0.7-1)
3.16-jessie-security: released (3.16.7-ckt11-1+deb8u1) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze14) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
Modified: active/CVE-2015-5366
===================================================================
--- active/CVE-2015-5366 2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-5366 2015-08-07 06:56:23 UTC (rev 3886)
@@ -8,5 +8,5 @@
2.6.32-upstream-stable: pending (2.6.32.68)
sid: released (4.0.7-1)
3.16-jessie-security: released (3.16.7-ckt11-1+deb8u1) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze14) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
Modified: active/CVE-2015-5697
===================================================================
--- active/CVE-2015-5697 2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-5697 2015-08-07 06:56:23 UTC (rev 3886)
@@ -8,6 +8,6 @@
3.2-upstream-stable: needed
2.6.32-upstream-stable: needed
sid: released (4.1.3-1) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze14) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
Modified: active/CVE-2015-5706
===================================================================
--- active/CVE-2015-5706 2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-5706 2015-08-07 06:56:23 UTC (rev 3886)
@@ -7,6 +7,6 @@
3.2-upstream-stable: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e"
2.6.32-upstream-stable: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e"
sid: released (4.0.4-1)
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u3) [bugfix/all/path_openat-fix-double-fput.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/path_openat-fix-double-fput.patch]
3.2-wheezy-security: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e"
2.6.32-squeeze-security: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e"
Modified: active/CVE-2015-5707
===================================================================
--- active/CVE-2015-5707 2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-5707 2015-08-07 06:56:23 UTC (rev 3886)
@@ -8,6 +8,6 @@
3.2-upstream-stable: pending (3.2.70) [sg_start_req-make-sure-that-there-s-not-too-many-elements-in-iovec.patch]
2.6.32-upstream-stable: pending (2.6.32.68)
sid: released (4.1.3-1)
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u3) [bugfix/all/sg_start_req-make-sure-that-there-s-not-too-many-ele.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/all/sg_start_req-make-sure-that-there-s-not-too-many-ele.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/sg_start_req-make-sure-that-there-s-not-too-many-ele.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/sg_start_req-make-sure-that-there-s-not-too-many-ele.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze14) [bugfix/all/sg_start_req-make-sure-that-there-s-not-too-many-ele.patch]
More information about the kernel-sec-discuss
mailing list