[kernel-sec-discuss] r3936 - active

Ben Hutchings benh at moszumanska.debian.org
Sat Sep 26 14:38:50 UTC 2015


Author: benh
Date: 2015-09-26 14:38:50 +0000 (Sat, 26 Sep 2015)
New Revision: 3936

Modified:
   active/CVE-2015-2925
   active/CVE-2015-5257
   active/CVE-2015-6937
   active/CVE-2015-7312
Log:
Mark 4.2.1-1 as released

Modified: active/CVE-2015-2925
===================================================================
--- active/CVE-2015-2925	2015-09-25 17:17:46 UTC (rev 3935)
+++ active/CVE-2015-2925	2015-09-26 14:38:50 UTC (rev 3936)
@@ -14,7 +14,7 @@
 Bugs:
 upstream: released (4.3-rc1) [cde93be45a8a90d8c264c776fab63487b5038a65, a03e283bf5c3d4851b4998122196ce9f849e6dfb, 397d425dc26da728396e66d392d5dcb8dac30c37]
 2.6.32-upstream-stable: N/A "user namespaces known broken before 3.5"
-sid: pending (4.2.1-1) [bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/dcache-reduce-the-scope-of-i_lock-in-d_splice_alias.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-f.patch]
+sid: released (4.2.1-1) [bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/dcache-reduce-the-scope-of-i_lock-in-d_splice_alias.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-f.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/namei-lift-open-coded-terminate_walk-in-follow_dotdo.patch, bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-f.patch]
 3.2-wheezy-security: N/A "user namespaces known broken before 3.5"
 2.6.32-squeeze-security: N/A "user namespaces known broken before 3.5"

Modified: active/CVE-2015-5257
===================================================================
--- active/CVE-2015-5257	2015-09-25 17:17:46 UTC (rev 3935)
+++ active/CVE-2015-5257	2015-09-26 14:38:50 UTC (rev 3936)
@@ -8,7 +8,7 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
-sid: pending (4.2.1-1) [bugfix/all/usb-whiteheat-fix-potential-null-deref-at-probe.patch]
+sid: released (4.2.1-1) [bugfix/all/usb-whiteheat-fix-potential-null-deref-at-probe.patch]
 3.16-jessie-security: needed
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed

Modified: active/CVE-2015-6937
===================================================================
--- active/CVE-2015-6937	2015-09-25 17:17:46 UTC (rev 3935)
+++ active/CVE-2015-6937	2015-09-26 14:38:50 UTC (rev 3936)
@@ -6,7 +6,7 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
-sid: pending (4.2.1-1) [bugfix/all/rds-verify-the-underlying-transport-exists-before-cr.patch]
+sid: released (4.2.1-1) [bugfix/all/rds-verify-the-underlying-transport-exists-before-cr.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/rds-verify-the-underlying-transport-exists-before-cr.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u4) [bugfix/all/rds-verify-the-underlying-transport-exists-before-cr.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze14) [bugfix/all/rds-verify-the-underlying-transport-exists-before-cr.patch]

Modified: active/CVE-2015-7312
===================================================================
--- active/CVE-2015-7312	2015-09-25 17:17:46 UTC (rev 3935)
+++ active/CVE-2015-7312	2015-09-26 14:38:50 UTC (rev 3936)
@@ -8,7 +8,7 @@
 3.16-upstream-stable: N/A "vulnerable code not present"
 3.2-upstream-stable: N/A "vulnerable code not present"
 2.6.32-upstream-stable: N/A "vulnerable code not present"
-sid: pending (4.2.1-1) [features/all/aufs4/aufs4-mmap.patch]
+sid: released (4.2.1-1) [features/all/aufs4/aufs4-mmap.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [features/all/aufs3/aufs3-mmap-fix-races.patch]
 3.2-wheezy-security: N/A "vulnerable code not present"
 2.6.32-squeeze-security: N/A "vulnerable code not present"




More information about the kernel-sec-discuss mailing list