[kernel-sec-discuss] r5175 - active
Ben Hutchings
benh at moszumanska.debian.org
Wed Apr 19 17:59:27 UTC 2017
Author: benh
Date: 2017-04-19 17:59:27 +0000 (Wed, 19 Apr 2017)
New Revision: 5175
Modified:
active/CVE-2017-2647
active/CVE-2017-2671
active/CVE-2017-6951
active/CVE-2017-7184
active/CVE-2017-7261
active/CVE-2017-7273
active/CVE-2017-7294
active/CVE-2017-7308
active/CVE-2017-7616
active/CVE-2017-7618
Log:
Mark issues pending for jessie via point release
Modified: active/CVE-2017-2647
===================================================================
--- active/CVE-2017-2647 2017-04-19 17:50:12 UTC (rev 5174)
+++ active/CVE-2017-2647 2017-04-19 17:59:27 UTC (rev 5175)
@@ -16,5 +16,5 @@
3.16-upstream-stable: released (3.16.43) [c53ee259ad3da891e191dee7af119af340f9c01b]
3.2-upstream-stable: released (3.2.88) [e2b41f761b086da2ec43b1cfea14ca0681cd08b0]
sid: released (4.0.2-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.43-1)
3.2-wheezy-security: needed
Modified: active/CVE-2017-2671
===================================================================
--- active/CVE-2017-2671 2017-04-19 17:50:12 UTC (rev 5174)
+++ active/CVE-2017-2671 2017-04-19 17:59:27 UTC (rev 5175)
@@ -10,5 +10,5 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
sid: pending (4.9.22-1) [bugfix/all/ping-implement-proper-locking.patch]
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.43-1) [bugfix/all/ping-implement-proper-locking.patch]
3.2-wheezy-security: needed
Modified: active/CVE-2017-6951
===================================================================
--- active/CVE-2017-6951 2017-04-19 17:50:12 UTC (rev 5174)
+++ active/CVE-2017-6951 2017-04-19 17:59:27 UTC (rev 5175)
@@ -15,5 +15,5 @@
3.16-upstream-stable: released (3.16.43) [c53ee259ad3da891e191dee7af119af340f9c01b]
3.2-upstream-stable: released (3.2.88) [e2b41f761b086da2ec43b1cfea14ca0681cd08b0]
sid: released (4.0.2-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.43-1)
3.2-wheezy-security: needed
Modified: active/CVE-2017-7184
===================================================================
--- active/CVE-2017-7184 2017-04-19 17:50:12 UTC (rev 5174)
+++ active/CVE-2017-7184 2017-04-19 17:59:27 UTC (rev 5175)
@@ -11,5 +11,5 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
sid: released (4.9.18-1) [bugfix/all/xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, bugfix/all/xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.43-1) [bugfix/all/xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, bugfix/all/xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
3.2-wheezy-security: needed
Modified: active/CVE-2017-7261
===================================================================
--- active/CVE-2017-7261 2017-04-19 17:50:12 UTC (rev 5174)
+++ active/CVE-2017-7261 2017-04-19 17:59:27 UTC (rev 5175)
@@ -15,5 +15,5 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
sid: released (4.9.18-1) [bugfix/x86/vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.43-1) [bugfix/x86/vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
3.2-wheezy-security: needed
Modified: active/CVE-2017-7273
===================================================================
--- active/CVE-2017-7273 2017-04-19 17:50:12 UTC (rev 5174)
+++ active/CVE-2017-7273 2017-04-19 17:59:27 UTC (rev 5175)
@@ -7,5 +7,5 @@
3.16-upstream-stable: released (3.16.42) [60a990276a03f9a11d86017b1217f3698443c47b]
3.2-upstream-stable: released (3.2.87) [4faec4a2ef5dd481682cc155cb9ea14ba2534b76]
sid: released (4.9.6-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.43-1)
3.2-wheezy-security: needed
Modified: active/CVE-2017-7294
===================================================================
--- active/CVE-2017-7294 2017-04-19 17:50:12 UTC (rev 5174)
+++ active/CVE-2017-7294 2017-04-19 17:59:27 UTC (rev 5175)
@@ -9,5 +9,5 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
sid: released (4.9.18-1) [bugfix/x86/drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.43-1) [bugfix/x86/drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
3.2-wheezy-security: needed
Modified: active/CVE-2017-7308
===================================================================
--- active/CVE-2017-7308 2017-04-19 17:50:12 UTC (rev 5174)
+++ active/CVE-2017-7308 2017-04-19 17:59:27 UTC (rev 5175)
@@ -13,5 +13,5 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
sid: released (4.9.18-1) [bugfix/all/net-packet-fix-overflow-in-check-for-priv-area-size.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_reserve.patch]
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.43-1) [bugfix/all/net-packet-fix-overflow-in-check-for-priv-area-size.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_reserve.patch]
3.2-wheezy-security: needed
Modified: active/CVE-2017-7616
===================================================================
--- active/CVE-2017-7616 2017-04-19 17:50:12 UTC (rev 5174)
+++ active/CVE-2017-7616 2017-04-19 17:59:27 UTC (rev 5175)
@@ -7,5 +7,5 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
sid: pending (4.9.22-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.43-1) [bugfix/all/mm-mempolicy.c-fix-error-handling-in-set_mempolicy-a.patch]
3.2-wheezy-security: needed
Modified: active/CVE-2017-7618
===================================================================
--- active/CVE-2017-7618 2017-04-19 17:50:12 UTC (rev 5174)
+++ active/CVE-2017-7618 2017-04-19 17:59:27 UTC (rev 5175)
@@ -9,5 +9,5 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
sid: pending (4.9.22-1) [bugfix/all/crypto-ahash-fix-einprogress-notification-callback.patch]
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.43-1) [bugfix/all/crypto-ahash-fix-einprogress-notification-callback.patch]
3.2-wheezy-security: needed
More information about the kernel-sec-discuss
mailing list