[kernel-sec-discuss] r5454 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Tue Aug 8 08:18:51 UTC 2017


Author: carnil
Date: 2017-08-08 08:18:50 +0000 (Tue, 08 Aug 2017)
New Revision: 5454

Modified:
   active/CVE-2017-7533
   active/CVE-2017-7541
   active/CVE-2017-7542
   active/CVE-2017-8831
Log:
Bump pending version for sid branch from 4.12.3-1 to 4.12.5-1

Modified: active/CVE-2017-7533
===================================================================
--- active/CVE-2017-7533	2017-08-08 04:13:43 UTC (rev 5453)
+++ active/CVE-2017-7533	2017-08-08 08:18:50 UTC (rev 5454)
@@ -12,7 +12,7 @@
 4.9-upstream-stable: released (4.9.41) [ad25f11ed216d5ce3b5566b2f187b59fa3061b40]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in (3.14-rc1) [7053aee26a3548ebaba046ae2e52396ccf56ac6c]"
-sid: pending (4.12.3-1) [bugfix/all/dentry-name-snapshots.patch]
+sid: pending (4.12.5-1)
 4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/dentry-name-snapshots.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u3) [bugfix/all/dentry-name-snapshots.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-7541
===================================================================
--- active/CVE-2017-7541	2017-08-08 04:13:43 UTC (rev 5453)
+++ active/CVE-2017-7541	2017-08-08 08:18:50 UTC (rev 5454)
@@ -8,7 +8,7 @@
 4.9-upstream-stable: released (4.9.39) [414848bba6ab91fe12ca8105b4652c4aa6f4b574]
 3.16-upstream-stable: pending
 3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.12.3-1)
+sid: pending (4.12.5-1)
 4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u3) [bugfix/all/brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-7542
===================================================================
--- active/CVE-2017-7542	2017-08-08 04:13:43 UTC (rev 5453)
+++ active/CVE-2017-7542	2017-08-08 08:18:50 UTC (rev 5454)
@@ -6,7 +6,7 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.12.3-1) [bugfix/all/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch]
+sid: pending (4.12.5-1) [bugfix/all/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch]
 4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u3) [bugfix/all/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch]
 3.2-wheezy-security: needed

Modified: active/CVE-2017-8831
===================================================================
--- active/CVE-2017-8831	2017-08-08 04:13:43 UTC (rev 5453)
+++ active/CVE-2017-8831	2017-08-08 08:18:50 UTC (rev 5454)
@@ -9,7 +9,7 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.12.3-1) [bugfix/all/media-saa7164-fix-double-fetch-PCIe-access-condition.patch]
+sid: pending (4.12.5-1) [bugfix/all/media-saa7164-fix-double-fetch-PCIe-access-condition.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: needed
 3.2-wheezy-security: needed




More information about the kernel-sec-discuss mailing list