[kernel-sec-discuss] r3831 - active
Ben Hutchings
benh at moszumanska.debian.org
Sun Jun 14 20:47:46 UTC 2015
Author: benh
Date: 2015-06-14 20:47:46 +0000 (Sun, 14 Jun 2015)
New Revision: 3831
Modified:
active/CVE-2015-1805
active/CVE-2015-3636
active/CVE-2015-4036
active/CVE-2015-4167
Log:
Update status of issues in 3.2/wheezy
Modified: active/CVE-2015-1805
===================================================================
--- active/CVE-2015-1805 2015-06-14 20:47:31 UTC (rev 3830)
+++ active/CVE-2015-1805 2015-06-14 20:47:46 UTC (rev 3831)
@@ -5,10 +5,10 @@
Notes:
Bugs:
upstream: released (v3.16-rc1) [637b58c2887e5e57850865839cc75f59184b23d1, f0d1bec9d58d4c038d0ac958c9af82be6eb18045]
-3.2-upstream-stable:
+3.2-upstream-stable: needed
3.16-jessie-security: N/A
2.6.32-upstream-stable: needed
sid: released (3.16.2-2)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.68-1+deb7u2) [bugfix/all/pipe-iovec-fix-memory-corruption-when-retrying-atomi.patch]
3.16-upstream-stable: N/A
2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/pipe-iovec-fix-memory-corruption-when-retrying-atomi.patch]
Modified: active/CVE-2015-3636
===================================================================
--- active/CVE-2015-3636 2015-06-14 20:47:31 UTC (rev 3830)
+++ active/CVE-2015-3636 2015-06-14 20:47:46 UTC (rev 3831)
@@ -9,5 +9,5 @@
2.6.32-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.0.2-1) [bugfix/all/ipv4-missing-sk_nulls_node_init-in-ping_unhash.patch]
3.16-jessie-security: released (3.16.7-ckt11-1)
-3.2-wheezy-security:
+3.2-wheezy-security: pending (3.2.68-1+deb7u2) [bugfix/all/ipv4-missing-sk_nulls_node_init-in-ping_unhash.patch]
2.6.32-squeeze-security: N/A "Vulnerable code not present"
Modified: active/CVE-2015-4036
===================================================================
--- active/CVE-2015-4036 2015-06-14 20:47:31 UTC (rev 3830)
+++ active/CVE-2015-4036 2015-06-14 20:47:46 UTC (rev 3831)
@@ -4,9 +4,9 @@
Bugs:
upstream: released (v4.0-rc1) [59c816c1f24df0204e01851431d3bab3eb76719c]
3.16-upstream-stable: released (3.16.7-ckt8)
-3.2-upstream-stable:
+3.2-upstream-stable: N/A "vulnerable code not present"
2.6.32-upstream-stable: N/A "vulnerable code not present"
sid: released (4.0.2-1)
3.16-jessie-security: released (3.16.7-ckt9-1)
-3.2-wheezy-security:
+3.2-wheezy-security: N/A "vulnerable code not present"
2.6.32-squeeze-security: N/A "vulnerable code not present"
Modified: active/CVE-2015-4167
===================================================================
--- active/CVE-2015-4167 2015-06-14 20:47:31 UTC (rev 3830)
+++ active/CVE-2015-4167 2015-06-14 20:47:46 UTC (rev 3831)
@@ -8,5 +8,5 @@
2.6.32-upstream-stable: needed
sid: released (4.0.2-1)
3.16-jessie-security: released (3.16.7-ckt13)
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.68-1+deb7u2) [bugfix/all/udf-check-length-of-extended-attributes-and-allocati.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/udf-check-length-of-extended-attributes-and-allocati.patch]
More information about the kernel-sec-discuss
mailing list