[kernel-sec-discuss] r3772 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Mon May 4 09:12:02 UTC 2015


Author: jmm
Date: 2015-05-04 09:12:01 +0000 (Mon, 04 May 2015)
New Revision: 3772

Modified:
   active/CVE-2014-8159
   active/CVE-2015-2666
   active/CVE-2015-2922
   active/CVE-2015-3331
   active/CVE-2015-3332
Log:
3.16.7-ckt10 released


Modified: active/CVE-2014-8159
===================================================================
--- active/CVE-2014-8159	2015-05-04 08:23:20 UTC (rev 3771)
+++ active/CVE-2014-8159	2015-05-04 09:12:01 UTC (rev 3772)
@@ -9,5 +9,5 @@
 3.16-jessie-security: N/A "Fixed before initial release"
 3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/ib-core-prevent-integer-overflow-in-ib_umem_get.patch]
-3.16-upstream-stable: pending (3.16.7-ckt10)
+3.16-upstream-stable: released (3.16.7-ckt10)
 3.2-upstream-stable: pending (3.2.69) [ib-uverbs-prevent-integer-overflow-in-ib_umem_get-address-arithmetic.patch]

Modified: active/CVE-2015-2666
===================================================================
--- active/CVE-2015-2666	2015-05-04 08:23:20 UTC (rev 3771)
+++ active/CVE-2015-2666	2015-05-04 09:12:01 UTC (rev 3772)
@@ -8,5 +8,5 @@
 3.16-jessie-security: N/A "Fixed before initial release"
 3.2-wheezy-security: N/A "Introduced in 3.9 with ec400ddeff200b068ddc6c70f7321f49ecf32ed5"
 2.6.32-squeeze-security: N/A "Introduced in 3.9 with ec400ddeff200b068ddc6c70f7321f49ecf32ed5"
-3.16-upstream-stable: pending (3.16.7-ckt10)
+3.16-upstream-stable: released (3.16.7-ckt10)
 3.2-upstream-stable: N/A "Introduced in 3.9 with ec400ddeff200b068ddc6c70f7321f49ecf32ed5"

Modified: active/CVE-2015-2922
===================================================================
--- active/CVE-2015-2922	2015-05-04 08:23:20 UTC (rev 3771)
+++ active/CVE-2015-2922	2015-05-04 09:12:01 UTC (rev 3772)
@@ -8,5 +8,5 @@
 3.16-jessie-security: N/A "Fixed before initial release"
 3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze12) [bugfix/all/ipv6-don-t-reduce-hop-limit-for-an-interface.patch]
-3.16-upstream-stable: pending (3.16.7-ckt10)
+3.16-upstream-stable: released (3.16.7-ckt10)
 3.2-upstream-stable: pending (3.2.69) [ipv6-don-t-reduce-hop-limit-for-an-interface.patch]

Modified: active/CVE-2015-3331
===================================================================
--- active/CVE-2015-3331	2015-05-04 08:23:20 UTC (rev 3771)
+++ active/CVE-2015-3331	2015-05-04 09:12:01 UTC (rev 3772)
@@ -9,5 +9,5 @@
 3.16-jessie-security: released (3.16.7-ckt9-3~deb8u1) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u1) [bugfix/x86/crypto-aesni-fix-memory-usage-in-GCM-decryption.patch]
 2.6.32-squeeze-security: N/A "Introduced in v2.6.38-rc1 with 0bd82f5f6355775fbaf7d3c664432ce1b862be1e"
-3.16-upstream-stable: pending (3.16.7-ckt10)
+3.16-upstream-stable: released (3.16.7-ckt10)
 3.2-upstream-stable: pending (3.2.69) [crypto-aesni-fix-memory-usage-in-gcm-decryption.patch]

Modified: active/CVE-2015-3332
===================================================================
--- active/CVE-2015-3332	2015-05-04 08:23:20 UTC (rev 3771)
+++ active/CVE-2015-3332	2015-05-04 09:12:01 UTC (rev 3772)
@@ -9,5 +9,5 @@
 3.16-jessie-security: released (3.16.7-ckt9-3~deb8u1) [bugfix/all/tcp-fix-crash-in-tcp-fast-open.patch]
 3.2-wheezy-security: N/A "355a901e6cf1b2b763ec85caa2a9f04fbcc4ab4a not backported"
 2.6.32-squeeze-security: N/A "355a901e6cf1b2b763ec85caa2a9f04fbcc4ab4a not backported"
-3.16-upstream-stable: pending (3.16.7-ckt10)
+3.16-upstream-stable: released (3.16.7-ckt10)
 3.2-upstream-stable: N/A "355a901e6cf1b2b763ec85caa2a9f04fbcc4ab4a not backported"




More information about the kernel-sec-discuss mailing list