[kernel-sec-discuss] r3886 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Fri Aug 7 06:56:24 UTC 2015


Author: carnil
Date: 2015-08-07 06:56:23 +0000 (Fri, 07 Aug 2015)
New Revision: 3886

Modified:
   active/CVE-2015-1333
   active/CVE-2015-3212
   active/CVE-2015-4692
   active/CVE-2015-4700
   active/CVE-2015-5364
   active/CVE-2015-5366
   active/CVE-2015-5697
   active/CVE-2015-5706
   active/CVE-2015-5707
Log:
Mark CVEs are released for wheezy and jessie for DSA-3329-1

Modified: active/CVE-2015-1333
===================================================================
--- active/CVE-2015-1333	2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-1333	2015-08-07 06:56:23 UTC (rev 3886)
@@ -10,6 +10,6 @@
 3.2-upstream-stable: N/A ("Vulnerable code not present")
 2.6.32-upstream-stable: N/A ("Vulnerable code not present")
 sid: released (4.1.3-1) [bugfix/all/keys-ensure-we-free-the-assoc-array-edit-if-edit-is-valid.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u3) [bugfix/all/keys-ensure-we-free-the-assoc-array-edit-if-edit-is-valid.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/keys-ensure-we-free-the-assoc-array-edit-if-edit-is-valid.patch]
 3.2-wheezy-security: N/A ("Vulnerable code not present")
 2.6.32-squeeze-security: N/A ("Vulnerable code not present")

Modified: active/CVE-2015-3212
===================================================================
--- active/CVE-2015-3212	2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-3212	2015-08-07 06:56:23 UTC (rev 3886)
@@ -9,6 +9,6 @@
 3.2-upstream-stable: pending (3.2.70) [sctp-fix-asconf-list-handling.patch]
 2.6.32-upstream-stable: N/A "Introduced with 9f7d653b67aed2d92540fbb0a8adaf"
 sid: released (4.0.8-1)
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u3) [bugfix/all/sctp-fix-asconf-list-handling.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/all/sctp-fix-asconf-list-handling.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/sctp-fix-asconf-list-handling.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/sctp-fix-asconf-list-handling.patch]
 2.6.32-squeeze-security: N/A "Introduced with 9f7d653b67aed2d92540fbb0a8adaf"

Modified: active/CVE-2015-4692
===================================================================
--- active/CVE-2015-4692	2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-4692	2015-08-07 06:56:23 UTC (rev 3886)
@@ -9,6 +9,6 @@
 3.2-upstream-stable: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
 2.6.32-upstream-stable: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
 sid: released (4.0.8-1) [bugfix/x86/kvm-x86-fix-kvm_apic_has_events-to-check-for-null-po.patch]
-3.16-jessie-security: pending (3.16.7-ckt11+deb8u3) [bugfix/x86/kvm-x86-fix-kvm_apic_has_events-to-check-for-null-po.patch]
+3.16-jessie-security: released (3.16.7-ckt11+deb8u3) [bugfix/x86/kvm-x86-fix-kvm_apic_has_events-to-check-for-null-po.patch]
 3.2-wheezy-security: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"
 2.6.32-squeeze-security: N/A "Introduced with 66450a21f99636af4fafac2afd33f1a40631bc3a"

Modified: active/CVE-2015-4700
===================================================================
--- active/CVE-2015-4700	2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-4700	2015-08-07 06:56:23 UTC (rev 3886)
@@ -9,6 +9,6 @@
 3.2-upstream-stable: pending (3.2.70) [x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
 2.6.32-upstream-stable: N/A "Introduced in 3.0 with 0a14842f5a3c0e88a1e59fac5c3025db39721f74"
 sid: released (4.0.7-1)
-3.16-jessie-security: pending (3.16.7-ckt11+deb8u3) [bugfix/x86/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/x86/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
+3.16-jessie-security: released (3.16.7-ckt11+deb8u3) [bugfix/x86/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/x86/x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
 2.6.32-squeeze-security: N/A "Introduced in 3.0 with 0a14842f5a3c0e88a1e59fac5c3025db39721f74"

Modified: active/CVE-2015-5364
===================================================================
--- active/CVE-2015-5364	2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-5364	2015-08-07 06:56:23 UTC (rev 3886)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable: pending (2.6.32.68)
 sid: released (4.0.7-1)
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u1) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze14) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]

Modified: active/CVE-2015-5366
===================================================================
--- active/CVE-2015-5366	2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-5366	2015-08-07 06:56:23 UTC (rev 3886)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable: pending (2.6.32.68)
 sid: released (4.0.7-1)
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u1) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze14) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]

Modified: active/CVE-2015-5697
===================================================================
--- active/CVE-2015-5697	2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-5697	2015-08-07 06:56:23 UTC (rev 3886)
@@ -8,6 +8,6 @@
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
 sid: released (4.1.3-1) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze14) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]

Modified: active/CVE-2015-5706
===================================================================
--- active/CVE-2015-5706	2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-5706	2015-08-07 06:56:23 UTC (rev 3886)
@@ -7,6 +7,6 @@
 3.2-upstream-stable: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e"
 2.6.32-upstream-stable: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e"
 sid: released (4.0.4-1)
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u3) [bugfix/all/path_openat-fix-double-fput.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/path_openat-fix-double-fput.patch]
 3.2-wheezy-security: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e"
 2.6.32-squeeze-security: N/A "Introduced in 3.11-rc1 with 60545d0d4610b02e55f65d141c95b18ccf855b6e"

Modified: active/CVE-2015-5707
===================================================================
--- active/CVE-2015-5707	2015-08-06 06:47:53 UTC (rev 3885)
+++ active/CVE-2015-5707	2015-08-07 06:56:23 UTC (rev 3886)
@@ -8,6 +8,6 @@
 3.2-upstream-stable: pending (3.2.70) [sg_start_req-make-sure-that-there-s-not-too-many-elements-in-iovec.patch]
 2.6.32-upstream-stable: pending (2.6.32.68)
 sid: released (4.1.3-1)
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u3) [bugfix/all/sg_start_req-make-sure-that-there-s-not-too-many-ele.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u3) [bugfix/all/sg_start_req-make-sure-that-there-s-not-too-many-ele.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/sg_start_req-make-sure-that-there-s-not-too-many-ele.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/sg_start_req-make-sure-that-there-s-not-too-many-ele.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze14) [bugfix/all/sg_start_req-make-sure-that-there-s-not-too-many-ele.patch]




More information about the kernel-sec-discuss mailing list