[kernel-sec-discuss] r4001 - active

Ben Hutchings benh at moszumanska.debian.org
Mon Nov 16 22:13:25 UTC 2015


Author: benh
Date: 2015-11-16 22:13:25 +0000 (Mon, 16 Nov 2015)
New Revision: 4001

Modified:
   active/CVE-2015-0272
   active/CVE-2015-2925
   active/CVE-2015-5156
   active/CVE-2015-5257
   active/CVE-2015-5697
   active/CVE-2015-7613
Log:
Mark issues pending for 2.6.32-upstream-stable that Willy Tarreau has acked

Modified: active/CVE-2015-0272
===================================================================
--- active/CVE-2015-0272	2015-11-15 12:14:37 UTC (rev 4000)
+++ active/CVE-2015-0272	2015-11-16 22:13:25 UTC (rev 4001)
@@ -7,7 +7,7 @@
 upstream: released (v4.0-rc3) [77751427a1ff25b27d47a4c36b12c3c8667855ac]
 3.16-upstream-stable: released (3.16.7-ckt18)
 3.2-upstream-stable: released (3.2.72) [ipv6-addrconf-validate-new-mtu-before-applying-it.patch]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.69)
 sid: released (4.0.2-1)
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/ipv6-addrconf-validate-new-MTU-before-applying-it.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u4) [bugfix/all/ipv6-addrconf-validate-new-MTU-before-applying-it.patch]

Modified: active/CVE-2015-2925
===================================================================
--- active/CVE-2015-2925	2015-11-15 12:14:37 UTC (rev 4000)
+++ active/CVE-2015-2925	2015-11-16 22:13:25 UTC (rev 4001)
@@ -16,7 +16,7 @@
  bwh> Finally fixed upstream in a somewhat simpler way.
 Bugs:
 upstream: released (4.3-rc1) [cde93be45a8a90d8c264c776fab63487b5038a65, 397d425dc26da728396e66d392d5dcb8dac30c37]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.69)
 sid: released (4.2.1-1) [bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-f.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/namei-lift-open-coded-terminate_walk-in-follow_dotdo.patch, bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-f.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u5) [bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-from-their-mnt_root.patch]

Modified: active/CVE-2015-5156
===================================================================
--- active/CVE-2015-5156	2015-11-15 12:14:37 UTC (rev 4000)
+++ active/CVE-2015-5156	2015-11-16 22:13:25 UTC (rev 4001)
@@ -6,7 +6,7 @@
 upstream: released (4.2-rc7) [48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39]
 3.16-upstream-stable: released (3.16.7-ckt18)
 3.2-upstream-stable: released (3.2.72) [virtio-net-drop-netif_f_fraglist.patch]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.69)
 sid: released (4.1.5-1) [bugfix/all/virtio-net-drop-netif_f_fraglist.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/virtio-net-drop-netif_f_fraglist.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u4) [bugfix/all/virtio-net-drop-netif_f_fraglist.patch]

Modified: active/CVE-2015-5257
===================================================================
--- active/CVE-2015-5257	2015-11-15 12:14:37 UTC (rev 4000)
+++ active/CVE-2015-5257	2015-11-16 22:13:25 UTC (rev 4001)
@@ -7,7 +7,7 @@
 upstream: released (4.3-rc3) [cbb4be652d374f64661137756b8f357a1827d6a4]
 3.16-upstream-stable: released (3.16.7-ckt19) [73e6391770a65856100661b56bcfa4b37bd0a98e]
 3.2-upstream-stable: released (3.2.72) [usb-whiteheat-fix-potential-null-deref-at-probe.patch]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.69)
 sid: released (4.2.1-1) [bugfix/all/usb-whiteheat-fix-potential-null-deref-at-probe.patch]
 3.16-jessie-security: released (3.16.7-ckt11+deb8u5) [bugfix/all/usb-whiteheat-fix-potential-null-deref-at-probe.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u5) [bugfix/all/usb-whiteheat-fix-potential-null-deref-at-probe.patch]

Modified: active/CVE-2015-5697
===================================================================
--- active/CVE-2015-5697	2015-11-15 12:14:37 UTC (rev 4000)
+++ active/CVE-2015-5697	2015-11-16 22:13:25 UTC (rev 4001)
@@ -6,7 +6,7 @@
 upstream: released (4.2-rc6) [b6878d9e03043695dbf3fa1caa6dfc09db225b16]
 3.16-upstream-stable: released (3.16.7-ckt17)
 3.2-upstream-stable: released (3.2.72) [md-use-kzalloc-when-bitmap-is-disabled.patch]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.69)
 sid: released (4.1.3-1) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]

Modified: active/CVE-2015-7613
===================================================================
--- active/CVE-2015-7613	2015-11-15 12:14:37 UTC (rev 4000)
+++ active/CVE-2015-7613	2015-11-16 22:13:25 UTC (rev 4001)
@@ -8,7 +8,7 @@
 upstream: released (v4.3-rc4) [b9a532277938798b53178d5a66af6e2915cb27cf]
 3.16-upstream-stable: released (3.16.7-ckt19)
 3.2-upstream-stable: released (3.2.72) [initialize-msg-shm-ipc-objects-before-doing-ipc_addid.patch]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: pending (2.6.32.69)
 sid: released (4.2.3-1) [bugfix/all/Initialize-msg-shm-IPC-objects-before-doing-ipc_addid.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u5) [bugfix/all/Initialize-msg-shm-IPC-objects-before-doing-ipc_addid.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u5) [bugfix/all/Initialize-msg-shm-IPC-objects-before-doing-ipc_addi.patch]




More information about the kernel-sec-discuss mailing list