[kernel-sec-discuss] r5471 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Sat Aug 12 15:13:00 UTC 2017
Author: carnil
Date: 2017-08-12 15:13:00 +0000 (Sat, 12 Aug 2017)
New Revision: 5471
Modified:
active/CVE-2017-1000111
active/CVE-2017-1000112
active/CVE-2017-10663
active/CVE-2017-7533
active/CVE-2017-7541
active/CVE-2017-7542
active/CVE-2017-8831
Log:
Bump version pending for sid to 4.12.6-1
Modified: active/CVE-2017-1000111
===================================================================
--- active/CVE-2017-1000111 2017-08-11 19:20:46 UTC (rev 5470)
+++ active/CVE-2017-1000111 2017-08-12 15:13:00 UTC (rev 5471)
@@ -7,7 +7,7 @@
4.9-upstream-stable:
3.16-upstream-stable:
3.2-upstream-stable:
-sid: pending (4.12.5-1) [bugfix/all/packet-fix-tp_reserve-race-in-packet_set_ring.patch]
+sid: pending (4.12.6-1) [bugfix/all/packet-fix-tp_reserve-race-in-packet_set_ring.patch]
4.9-stretch-security:
3.16-jessie-security:
3.2-wheezy-security:
Modified: active/CVE-2017-1000112
===================================================================
--- active/CVE-2017-1000112 2017-08-11 19:20:46 UTC (rev 5470)
+++ active/CVE-2017-1000112 2017-08-12 15:13:00 UTC (rev 5471)
@@ -8,7 +8,7 @@
4.9-upstream-stable:
3.16-upstream-stable:
3.2-upstream-stable:
-sid: pending (4.12.5-1) [bugfix/all/udp-consistently-apply-ufo-or-fragmentation.patch]
+sid: pending (4.12.6-1) [bugfix/all/udp-consistently-apply-ufo-or-fragmentation.patch]
4.9-stretch-security:
3.16-jessie-security:
3.2-wheezy-security:
Modified: active/CVE-2017-10663
===================================================================
--- active/CVE-2017-10663 2017-08-11 19:20:46 UTC (rev 5470)
+++ active/CVE-2017-10663 2017-08-12 15:13:00 UTC (rev 5471)
@@ -8,7 +8,7 @@
4.9-upstream-stable: released (4.9.42) [0f442c5b2e4ac0b65027ed3374462f1c38675f7e]
3.16-upstream-stable:
3.2-upstream-stable:
-sid: pending (4.12.5-1)
+sid: pending (4.12.6-1)
4.9-stretch-security:
3.16-jessie-security:
3.2-wheezy-security:
Modified: active/CVE-2017-7533
===================================================================
--- active/CVE-2017-7533 2017-08-11 19:20:46 UTC (rev 5470)
+++ active/CVE-2017-7533 2017-08-12 15:13:00 UTC (rev 5471)
@@ -12,7 +12,7 @@
4.9-upstream-stable: released (4.9.41) [ad25f11ed216d5ce3b5566b2f187b59fa3061b40]
3.16-upstream-stable: needed
3.2-upstream-stable: N/A "Vulnerable code introduced in (3.14-rc1) [7053aee26a3548ebaba046ae2e52396ccf56ac6c]"
-sid: pending (4.12.5-1)
+sid: pending (4.12.6-1)
4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/dentry-name-snapshots.patch]
3.16-jessie-security: pending (3.16.43-2+deb8u3) [bugfix/all/dentry-name-snapshots.patch]
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-7541
===================================================================
--- active/CVE-2017-7541 2017-08-11 19:20:46 UTC (rev 5470)
+++ active/CVE-2017-7541 2017-08-12 15:13:00 UTC (rev 5471)
@@ -8,7 +8,7 @@
4.9-upstream-stable: released (4.9.39) [414848bba6ab91fe12ca8105b4652c4aa6f4b574]
3.16-upstream-stable: pending
3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.12.5-1)
+sid: pending (4.12.6-1)
4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80.patch]
3.16-jessie-security: pending (3.16.43-2+deb8u3) [bugfix/all/brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80.patch]
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-7542
===================================================================
--- active/CVE-2017-7542 2017-08-11 19:20:46 UTC (rev 5470)
+++ active/CVE-2017-7542 2017-08-12 15:13:00 UTC (rev 5471)
@@ -6,7 +6,7 @@
4.9-upstream-stable: released (4.9.42) [4a2ffe1707e3787f93a7d0ff2dec682a57ba25ad]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.12.5-1) [bugfix/all/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch]
+sid: pending (4.12.6-1)
4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch]
3.16-jessie-security: pending (3.16.43-2+deb8u3) [bugfix/all/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch]
3.2-wheezy-security: needed
Modified: active/CVE-2017-8831
===================================================================
--- active/CVE-2017-8831 2017-08-11 19:20:46 UTC (rev 5470)
+++ active/CVE-2017-8831 2017-08-12 15:13:00 UTC (rev 5471)
@@ -9,7 +9,7 @@
4.9-upstream-stable: released (4.9.42) [12d17d78e3f74b5022f61eee7d6de082e472a401]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.12.5-1) [bugfix/all/media-saa7164-fix-double-fetch-PCIe-access-condition.patch]
+sid: pending (4.12.6-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
3.2-wheezy-security: needed
More information about the kernel-sec-discuss
mailing list