[kernel-sec-discuss] r4031 - active

Ben Hutchings benh at moszumanska.debian.org
Fri Dec 4 18:06:07 UTC 2015


Author: benh
Date: 2015-12-04 18:06:07 +0000 (Fri, 04 Dec 2015)
New Revision: 4031

Modified:
   active/CVE-2013-7446
   active/CVE-2015-7799
   active/CVE-2015-7833
   active/CVE-2015-8104
   active/CVE-2015-8374
Log:
Mark issues released in 4.2.6-2

Modified: active/CVE-2013-7446
===================================================================
--- active/CVE-2013-7446	2015-12-03 00:59:37 UTC (rev 4030)
+++ active/CVE-2013-7446	2015-12-04 18:06:07 UTC (rev 4031)
@@ -11,7 +11,7 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
-sid: pending (4.2.6-2) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
+sid: released (4.2.6-2) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u1) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
 3.2-wheezy-security: pending (3.2.73-2+deb7u1) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/unix-avoid-use-after-free-in-ep_remove_wait_queue.patch]

Modified: active/CVE-2015-7799
===================================================================
--- active/CVE-2015-7799	2015-12-03 00:59:37 UTC (rev 4030)
+++ active/CVE-2015-7799	2015-12-04 18:06:07 UTC (rev 4031)
@@ -7,7 +7,7 @@
 3.16-upstream-stable: released (3.16.7-ckt20)
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
-sid: pending (4.2.6-2) [bugfix/all/isdn_ppp-add-checks-for-allocation-failure-in-isdn_p.patch, bugfix/all/ppp-slip-validate-vj-compression-slot-parameters-com.patch]
+sid: released (4.2.6-2) [bugfix/all/isdn_ppp-add-checks-for-allocation-failure-in-isdn_p.patch, bugfix/all/ppp-slip-validate-vj-compression-slot-parameters-com.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u1)
 3.2-wheezy-security: pending (3.2.73-2+deb7u1) [bugfix/all/isdn_ppp-add-checks-for-allocation-failure-in-isdn_p.patch, bugfix/all/ppp-slip-validate-vj-compression-slot-parameters-com.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/isdn_ppp-add-checks-for-allocation-failure-in-isdn_p.patch, bugfix/all/ppp-slip-validate-vj-compression-slot-parameters-com.patch]

Modified: active/CVE-2015-7833
===================================================================
--- active/CVE-2015-7833	2015-12-03 00:59:37 UTC (rev 4030)
+++ active/CVE-2015-7833	2015-12-04 18:06:07 UTC (rev 4031)
@@ -10,7 +10,7 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
-sid: pending (4.2.6-2) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, media-usbvision-fix-crash-on-detecting-device-with-i.patch]
+sid: released (4.2.6-2) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, media-usbvision-fix-crash-on-detecting-device-with-i.patch]
 3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u7) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, media-usbvision-fix-crash-on-detecting-device-with-i.patch]
 3.2-wheezy-security: pending (3.2.68-1+deb7u7) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, media-usbvision-fix-crash-on-detecting-device-with-i.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, media-usbvision-fix-crash-on-detecting-device-with-i.patch]

Modified: active/CVE-2015-8104
===================================================================
--- active/CVE-2015-8104	2015-12-03 00:59:37 UTC (rev 4030)
+++ active/CVE-2015-8104	2015-12-04 18:06:07 UTC (rev 4031)
@@ -9,7 +9,7 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: released (3.2.74)
 2.6.32-upstream-stable: needed
-sid: pending (4.2.6-2) [bugfix/x86/kvm-svm-unconditionally-intercept-DB.patch]
+sid: released (4.2.6-2) [bugfix/x86/kvm-svm-unconditionally-intercept-DB.patch]
 3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u7) [bugfix/x86/kvm-svm-unconditionally-intercept-DB.patch]
 3.2-wheezy-security: pending (3.2.73-2+deb7u1) [bugfix/x86/kvm-svm-unconditionally-intercept-db.patch]
 2.6.32-squeeze-security: ignored "KVM not supported in squeeze LTS"

Modified: active/CVE-2015-8374
===================================================================
--- active/CVE-2015-8374	2015-12-03 00:59:37 UTC (rev 4030)
+++ active/CVE-2015-8374	2015-12-04 18:06:07 UTC (rev 4031)
@@ -6,7 +6,7 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: released (3.2.74)
 2.6.32-upstream-stable: ignored "btrfs in 2.6.32 is just a tech preview and not usable for production"
-sid: pending (4.2.6-2) [bugfix/all/btrfs-fix-truncation-of-compressed-and-inlined-exten.patch]
+sid: released (4.2.6-2) [bugfix/all/btrfs-fix-truncation-of-compressed-and-inlined-exten.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u1) [bugfix/all/btrfs-fix-truncation-of-compressed-and-inlined-exten.patch]
 3.2-wheezy-security: ignored "btrfs in wheezy is just a tech preview and not usable for production"
 2.6.32-squeeze-security: ignored "btrfs in squeeze is just a tech preview and not usable for production"




More information about the kernel-sec-discuss mailing list