[kernel-sec-discuss] r3995 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Tue Nov 10 16:11:54 UTC 2015
Author: carnil
Date: 2015-11-10 16:11:54 +0000 (Tue, 10 Nov 2015)
New Revision: 3995
Modified:
active/CVE-2015-5307
active/CVE-2015-7833
active/CVE-2015-7884
active/CVE-2015-7990
Log:
Four CVEs fixed in unstable with 4.2.6-1
Modified: active/CVE-2015-5307
===================================================================
--- active/CVE-2015-5307 2015-11-10 07:37:34 UTC (rev 3994)
+++ active/CVE-2015-5307 2015-11-10 16:11:54 UTC (rev 3995)
@@ -6,7 +6,7 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
2.6.32-upstream-stable: needed
-sid: pending (4.2.5-2) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
+sid: released (4.2.6-1) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
2.6.32-squeeze-security: needed
Modified: active/CVE-2015-7833
===================================================================
--- active/CVE-2015-7833 2015-11-10 07:37:34 UTC (rev 3994)
+++ active/CVE-2015-7833 2015-11-10 16:11:54 UTC (rev 3995)
@@ -7,7 +7,7 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
2.6.32-upstream-stable: needed
-sid: pending (4.2.5-2) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
+sid: released (4.2.6-1) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch]
Modified: active/CVE-2015-7884
===================================================================
--- active/CVE-2015-7884 2015-11-10 07:37:34 UTC (rev 3994)
+++ active/CVE-2015-7884 2015-11-10 16:11:54 UTC (rev 3995)
@@ -7,7 +7,7 @@
3.16-upstream-stable: N/A "Vulnerable code introduced in 3.18"
3.2-upstream-stable: N/A "Vulnerable code introduced in 3.18"
2.6.32-upstream-stable: N/A "Vulnerable code introduced in 3.18"
-sid: pending (4.2.5-2) [bugfix/all/media-media-vivid-osd-fix-info-leak-in-ioctl.patch]
+sid: released (4.2.6-1) [bugfix/all/media-media-vivid-osd-fix-info-leak-in-ioctl.patch]
3.16-jessie-security: N/A "Vulnerable code introduced in 3.18"
3.2-wheezy-security: N/A "Vulnerable code introduced in 3.18"
2.6.32-squeeze-security: N/A "Vulnerable code introduced in 3.18"
Modified: active/CVE-2015-7990
===================================================================
--- active/CVE-2015-7990 2015-11-10 07:37:34 UTC (rev 3994)
+++ active/CVE-2015-7990 2015-11-10 16:11:54 UTC (rev 3995)
@@ -7,7 +7,7 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
2.6.32-upstream-stable: needed
-sid: pending (4.2.5-2) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
+sid: released (4.2.6-1) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
2.6.32-squeeze-security: pending (2.6.32-48squeeze17) [bugfix/all/rds-fix-race-condition-when-sending-a-message-on-unbound-socket.patch]
More information about the kernel-sec-discuss
mailing list