[kernel-sec-discuss] r3870 - active
Ben Hutchings
benh at moszumanska.debian.org
Wed Jul 22 02:11:18 UTC 2015
Author: benh
Date: 2015-07-22 02:11:18 +0000 (Wed, 22 Jul 2015)
New Revision: 3870
Modified:
active/CVE-2015-1420
active/CVE-2015-1805
active/CVE-2015-3212
active/CVE-2015-4700
active/CVE-2015-5364
active/CVE-2015-5366
Log:
Note fixes pending for 3.2.70
Modified: active/CVE-2015-1420
===================================================================
--- active/CVE-2015-1420 2015-07-20 21:23:18 UTC (rev 3869)
+++ active/CVE-2015-1420 2015-07-22 02:11:18 UTC (rev 3870)
@@ -11,4 +11,4 @@
3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/vfs-read-file_handle-only-once-in-handle_to_path.patch]
2.6.32-squeeze-security: N/A "Introduced in 2.6.39 with becfd1f37544798cbdfd788f32c827160fab98c1"
3.16-upstream-stable: released (3.16.7-ckt13)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.70) [vfs-read-file_handle-only-once-in-handle_to_path.patch]
Modified: active/CVE-2015-1805
===================================================================
--- active/CVE-2015-1805 2015-07-20 21:23:18 UTC (rev 3869)
+++ active/CVE-2015-1805 2015-07-22 02:11:18 UTC (rev 3870)
@@ -5,7 +5,7 @@
Notes:
Bugs:
upstream: released (v3.16-rc1) [637b58c2887e5e57850865839cc75f59184b23d1, f0d1bec9d58d4c038d0ac958c9af82be6eb18045]
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.70) [pipe-iovec-fix-memory-corruption-when-retrying-atomic-copy-as-non-atomic.patch]
3.16-jessie-security: N/A
2.6.32-upstream-stable: needed
sid: released (3.16.2-2)
Modified: active/CVE-2015-3212
===================================================================
--- active/CVE-2015-3212 2015-07-20 21:23:18 UTC (rev 3869)
+++ active/CVE-2015-3212 2015-07-22 02:11:18 UTC (rev 3870)
@@ -6,7 +6,7 @@
Bugs:
upstream: released (4.2-rc1) [2d45a02d0166caf2627fe91897c6ffc3b19514c4]
3.16-upstream-stable: released (3.16.7-ckt15)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.70) [sctp-fix-asconf-list-handling.patch]
2.6.32-upstream-stable: N/A "Introduced with 9f7d653b67aed2d92540fbb0a8adaf"
sid: released (4.0.8-1)
3.16-jessie-security: needed
Modified: active/CVE-2015-4700
===================================================================
--- active/CVE-2015-4700 2015-07-20 21:23:18 UTC (rev 3869)
+++ active/CVE-2015-4700 2015-07-22 02:11:18 UTC (rev 3870)
@@ -6,7 +6,7 @@
Bugs:
upstream: released (v4.1-rc6) [3f7352bf21f8fd7ba3e2fcef9488756f188e12be]
3.16-upstream-stable: released (3.16.7-ckt13)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.70) [x86-bpf_jit-fix-compilation-of-large-bpf-programs.patch]
2.6.32-upstream-stable: N/A "Introduced in 3.0 with 0a14842f5a3c0e88a1e59fac5c3025db39721f74"
sid: released (4.0.7-1)
3.16-jessie-security: needed
Modified: active/CVE-2015-5364
===================================================================
--- active/CVE-2015-5364 2015-07-20 21:23:18 UTC (rev 3869)
+++ active/CVE-2015-5364 2015-07-22 02:11:18 UTC (rev 3870)
@@ -4,7 +4,7 @@
Bugs:
upstream: released (4.1-rc7) [beb39db59d14990e401e235faf66a6b9b31240b0]
3.16-upstream-stable: released (3.16.7-ckt14)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.70) [udp-fix-behavior-of-wrong-checksums.patch]
2.6.32-upstream-stable: pending (2.6.32.68)
sid: released (4.0.7-1)
3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u1) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
Modified: active/CVE-2015-5366
===================================================================
--- active/CVE-2015-5366 2015-07-20 21:23:18 UTC (rev 3869)
+++ active/CVE-2015-5366 2015-07-22 02:11:18 UTC (rev 3870)
@@ -4,7 +4,7 @@
Bugs:
upstream: released (4.1-rc7) [beb39db59d14990e401e235faf66a6b9b31240b0]
3.16-upstream-stable: released (3.16.7-ckt14)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.70) [udp-fix-behavior-of-wrong-checksums.patch]
2.6.32-upstream-stable: pending (2.6.32.68)
sid: released (4.0.7-1)
3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u1) [bugfix/all/udp-fix-behavior-of-wrong-checksums.patch]
More information about the kernel-sec-discuss
mailing list