[kernel-sec-discuss] r3994 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Tue Nov 10 07:37:34 UTC 2015


Author: carnil
Date: 2015-11-10 07:37:34 +0000 (Tue, 10 Nov 2015)
New Revision: 3994

Modified:
   active/CVE-2015-5307
   active/CVE-2015-7833
   active/CVE-2015-7872
   active/CVE-2015-7990
Log:
Mark CVEs for DSA-3396-1 as released

Modified: active/CVE-2015-5307
===================================================================
--- active/CVE-2015-5307	2015-11-10 05:16:20 UTC (rev 3993)
+++ active/CVE-2015-5307	2015-11-10 07:37:34 UTC (rev 3994)
@@ -7,6 +7,6 @@
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
 sid: pending (4.2.5-2) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
 2.6.32-squeeze-security: needed

Modified: active/CVE-2015-7833
===================================================================
--- active/CVE-2015-7833	2015-11-10 05:16:20 UTC (rev 3993)
+++ active/CVE-2015-7833	2015-11-10 07:37:34 UTC (rev 3994)
@@ -8,6 +8,6 @@
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
 sid: pending (4.2.5-2) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u6) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u6) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]

Modified: active/CVE-2015-7872
===================================================================
--- active/CVE-2015-7872	2015-11-10 05:16:20 UTC (rev 3993)
+++ active/CVE-2015-7872	2015-11-10 07:37:34 UTC (rev 3994)
@@ -10,6 +10,6 @@
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: N/A "vulnerable code not present"
 sid: released (4.2.5-1) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u6) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u6) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
 2.6.32-squeeze-security: N/A "vulnerable code not present"

Modified: active/CVE-2015-7990
===================================================================
--- active/CVE-2015-7990	2015-11-10 05:16:20 UTC (rev 3993)
+++ active/CVE-2015-7990	2015-11-10 07:37:34 UTC (rev 3994)
@@ -8,6 +8,6 @@
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
 sid: pending (4.2.5-2) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
 2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]




More information about the kernel-sec-discuss mailing list