[kernel-sec-discuss] r3994 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Tue Nov 10 07:37:34 UTC 2015
Author: carnil
Date: 2015-11-10 07:37:34 +0000 (Tue, 10 Nov 2015)
New Revision: 3994
Modified:
active/CVE-2015-5307
active/CVE-2015-7833
active/CVE-2015-7872
active/CVE-2015-7990
Log:
Mark CVEs for DSA-3396-1 as released
Modified: active/CVE-2015-5307
===================================================================
--- active/CVE-2015-5307 2015-11-10 05:16:20 UTC (rev 3993)
+++ active/CVE-2015-5307 2015-11-10 07:37:34 UTC (rev 3994)
@@ -7,6 +7,6 @@
3.2-upstream-stable: needed
2.6.32-upstream-stable: needed
sid: pending (4.2.5-2) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2015-7833
===================================================================
--- active/CVE-2015-7833 2015-11-10 05:16:20 UTC (rev 3993)
+++ active/CVE-2015-7833 2015-11-10 07:37:34 UTC (rev 3994)
@@ -8,6 +8,6 @@
3.2-upstream-stable: needed
2.6.32-upstream-stable: needed
sid: pending (4.2.5-2) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u6) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u6) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
Modified: active/CVE-2015-7872
===================================================================
--- active/CVE-2015-7872 2015-11-10 05:16:20 UTC (rev 3993)
+++ active/CVE-2015-7872 2015-11-10 07:37:34 UTC (rev 3994)
@@ -10,6 +10,6 @@
3.2-upstream-stable: needed
2.6.32-upstream-stable: N/A "vulnerable code not present"
sid: released (4.2.5-1) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u6) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u6) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
2.6.32-squeeze-security: N/A "vulnerable code not present"
Modified: active/CVE-2015-7990
===================================================================
--- active/CVE-2015-7990 2015-11-10 05:16:20 UTC (rev 3993)
+++ active/CVE-2015-7990 2015-11-10 07:37:34 UTC (rev 3994)
@@ -8,6 +8,6 @@
3.2-upstream-stable: needed
2.6.32-upstream-stable: needed
sid: pending (4.2.5-2) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
-3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
-3.2-wheezy-security: pending (3.2.68-1+deb7u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
+3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
+3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
More information about the kernel-sec-discuss
mailing list