[kernel-sec-discuss] r4012 - active

Ben Hutchings benh at moszumanska.debian.org
Thu Nov 19 14:22:21 UTC 2015


Author: benh
Date: 2015-11-19 14:22:21 +0000 (Thu, 19 Nov 2015)
New Revision: 4012

Modified:
   active/CVE-2015-5307
   active/CVE-2015-7799
   active/CVE-2015-7872
   active/CVE-2015-8019
Log:
Mark 3.2.73 and 3.16.7-ckt20 released

Modified: active/CVE-2015-5307
===================================================================
--- active/CVE-2015-5307	2015-11-19 14:22:01 UTC (rev 4011)
+++ active/CVE-2015-5307	2015-11-19 14:22:21 UTC (rev 4012)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (4.4-rc1) [54a20552e1eae07aa240fa370a0293e006b5faed]
 3.16-upstream-stable: needed
-3.2-upstream-stable: pending (3.2.73) [kvm-x86-work-around-infinite-loop-in-microcode-when-ac-is.patch]
+3.2-upstream-stable: released (3.2.73) [kvm-x86-work-around-infinite-loop-in-microcode-when-ac-is.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.2.6-1) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]

Modified: active/CVE-2015-7799
===================================================================
--- active/CVE-2015-7799	2015-11-19 14:22:01 UTC (rev 4011)
+++ active/CVE-2015-7799	2015-11-19 14:22:21 UTC (rev 4012)
@@ -4,7 +4,7 @@
 Notes:
 Bugs:
 upstream: released (4.4-rc1) [0baa57d8dc32db78369d8b5176ef56c5e2e18ab3, 4ab42d78e37a294ac7bc56901d563c642e03c4ae]
-3.16-upstream-stable: pending (3.16.7-ckt20)
+3.16-upstream-stable: released (3.16.7-ckt20)
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
 sid: needed

Modified: active/CVE-2015-7872
===================================================================
--- active/CVE-2015-7872	2015-11-19 14:22:01 UTC (rev 4011)
+++ active/CVE-2015-7872	2015-11-19 14:22:21 UTC (rev 4012)
@@ -7,7 +7,7 @@
  https://bugzilla.redhat.com/show_bug.cgi?id=1272172
 upstream: released (v4.3-rc7) [f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61]
 3.16-upstream-stable: released (3.16.7-ckt19)
-3.2-upstream-stable: pending (3.2.73) [keys-fix-crash-when-attempt-to-garbage-collect-an-uninstantiated.patch]
+3.2-upstream-stable: released (3.2.73) [keys-fix-crash-when-attempt-to-garbage-collect-an-uninstantiated.patch]
 2.6.32-upstream-stable: N/A "vulnerable code not present"
 sid: released (4.2.5-1) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]

Modified: active/CVE-2015-8019
===================================================================
--- active/CVE-2015-8019	2015-11-19 14:22:01 UTC (rev 4011)
+++ active/CVE-2015-8019	2015-11-19 14:22:21 UTC (rev 4012)
@@ -11,7 +11,7 @@
 Bugs:
 upstream: N/A "Vulnerable code not present"
 3.16-upstream-stable: released (v3.16.7-ckt19) [fa89ae5548ed282f0ceb4660b3b93e4e2ee875f3]
-3.2-upstream-stable: pending (3.2.73) [net-add-length-argument-to-skb_copy_and_csum_datagram_iovec.patch]
+3.2-upstream-stable: released (3.2.73) [net-add-length-argument-to-skb_copy_and_csum_datagram_iovec.patch]
 2.6.32-upstream-stable: N/A "Vulnerable code not present"
 sid: N/A "Vulnerable code not present"
 3.16-jessie-security: N/A "Vulnerable code not present"




More information about the kernel-sec-discuss mailing list