[kernel-sec-discuss] r3831 - active

Ben Hutchings benh at moszumanska.debian.org
Sun Jun 14 20:47:46 UTC 2015


Author: benh
Date: 2015-06-14 20:47:46 +0000 (Sun, 14 Jun 2015)
New Revision: 3831

Modified:
   active/CVE-2015-1805
   active/CVE-2015-3636
   active/CVE-2015-4036
   active/CVE-2015-4167
Log:
Update status of issues in 3.2/wheezy

Modified: active/CVE-2015-1805
===================================================================
--- active/CVE-2015-1805	2015-06-14 20:47:31 UTC (rev 3830)
+++ active/CVE-2015-1805	2015-06-14 20:47:46 UTC (rev 3831)
@@ -5,10 +5,10 @@
 Notes:
 Bugs: 
 upstream: released (v3.16-rc1) [637b58c2887e5e57850865839cc75f59184b23d1, f0d1bec9d58d4c038d0ac958c9af82be6eb18045]
-3.2-upstream-stable:
+3.2-upstream-stable: needed
 3.16-jessie-security: N/A
 2.6.32-upstream-stable: needed
 sid: released (3.16.2-2)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.68-1+deb7u2) [bugfix/all/pipe-iovec-fix-memory-corruption-when-retrying-atomi.patch]
 3.16-upstream-stable: N/A
 2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/pipe-iovec-fix-memory-corruption-when-retrying-atomi.patch]

Modified: active/CVE-2015-3636
===================================================================
--- active/CVE-2015-3636	2015-06-14 20:47:31 UTC (rev 3830)
+++ active/CVE-2015-3636	2015-06-14 20:47:46 UTC (rev 3831)
@@ -9,5 +9,5 @@
 2.6.32-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.0.2-1) [bugfix/all/ipv4-missing-sk_nulls_node_init-in-ping_unhash.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.68-1+deb7u2) [bugfix/all/ipv4-missing-sk_nulls_node_init-in-ping_unhash.patch]
 2.6.32-squeeze-security: N/A "Vulnerable code not present"

Modified: active/CVE-2015-4036
===================================================================
--- active/CVE-2015-4036	2015-06-14 20:47:31 UTC (rev 3830)
+++ active/CVE-2015-4036	2015-06-14 20:47:46 UTC (rev 3831)
@@ -4,9 +4,9 @@
 Bugs:
 upstream: released (v4.0-rc1) [59c816c1f24df0204e01851431d3bab3eb76719c]
 3.16-upstream-stable: released (3.16.7-ckt8)
-3.2-upstream-stable:
+3.2-upstream-stable: N/A "vulnerable code not present"
 2.6.32-upstream-stable: N/A "vulnerable code not present"
 sid: released (4.0.2-1)
 3.16-jessie-security: released (3.16.7-ckt9-1)
-3.2-wheezy-security:
+3.2-wheezy-security: N/A "vulnerable code not present"
 2.6.32-squeeze-security: N/A "vulnerable code not present"

Modified: active/CVE-2015-4167
===================================================================
--- active/CVE-2015-4167	2015-06-14 20:47:31 UTC (rev 3830)
+++ active/CVE-2015-4167	2015-06-14 20:47:46 UTC (rev 3831)
@@ -8,5 +8,5 @@
 2.6.32-upstream-stable: needed
 sid: released (4.0.2-1)
 3.16-jessie-security: released (3.16.7-ckt13)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.68-1+deb7u2) [bugfix/all/udf-check-length-of-extended-attributes-and-allocati.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-check-length-of-extended-attributes-and-allocati.patch]




More information about the kernel-sec-discuss mailing list