[kernel-sec-discuss] r5475 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sun Aug 13 15:59:51 UTC 2017


Author: carnil
Date: 2017-08-13 15:59:51 +0000 (Sun, 13 Aug 2017)
New Revision: 5475

Modified:
   active/CVE-2017-1000111
   active/CVE-2017-1000112
   active/CVE-2017-10663
   active/CVE-2017-11600
   active/CVE-2017-7533
   active/CVE-2017-7541
   active/CVE-2017-7542
   active/CVE-2017-8831
Log:
4.12.6-1 released to sid

Modified: active/CVE-2017-1000111
===================================================================
--- active/CVE-2017-1000111	2017-08-13 04:33:51 UTC (rev 5474)
+++ active/CVE-2017-1000111	2017-08-13 15:59:51 UTC (rev 5475)
@@ -7,7 +7,7 @@
 4.9-upstream-stable: released (4.9.43) [e5841355061332f8b326e098949490345dba776b]
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.12.6-1) [bugfix/all/packet-fix-tp_reserve-race-in-packet_set_ring.patch]
+sid: released (4.12.6-1) [bugfix/all/packet-fix-tp_reserve-race-in-packet_set_ring.patch]
 4.9-stretch-security:
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-1000112
===================================================================
--- active/CVE-2017-1000112	2017-08-13 04:33:51 UTC (rev 5474)
+++ active/CVE-2017-1000112	2017-08-13 15:59:51 UTC (rev 5475)
@@ -8,7 +8,7 @@
 4.9-upstream-stable: released (4.9.43) [33dc6a6a85f1d6ce71e7056d009b8a5fcbf10f70]
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.12.6-1) [bugfix/all/udp-consistently-apply-ufo-or-fragmentation.patch]
+sid: released (4.12.6-1) [bugfix/all/udp-consistently-apply-ufo-or-fragmentation.patch]
 4.9-stretch-security:
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-10663
===================================================================
--- active/CVE-2017-10663	2017-08-13 04:33:51 UTC (rev 5474)
+++ active/CVE-2017-10663	2017-08-13 15:59:51 UTC (rev 5475)
@@ -8,7 +8,7 @@
 4.9-upstream-stable: released (4.9.42) [0f442c5b2e4ac0b65027ed3374462f1c38675f7e]
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.12.6-1)
+sid: released (4.12.6-1)
 4.9-stretch-security:
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-11600
===================================================================
--- active/CVE-2017-11600	2017-08-13 04:33:51 UTC (rev 5474)
+++ active/CVE-2017-11600	2017-08-13 15:59:51 UTC (rev 5475)
@@ -12,7 +12,7 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.12.6-1) [bugfix/all/xfrm-policy-check-policy-direction-value.patch]
+sid: released (4.12.6-1) [bugfix/all/xfrm-policy-check-policy-direction-value.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-7533
===================================================================
--- active/CVE-2017-7533	2017-08-13 04:33:51 UTC (rev 5474)
+++ active/CVE-2017-7533	2017-08-13 15:59:51 UTC (rev 5475)
@@ -12,7 +12,7 @@
 4.9-upstream-stable: released (4.9.41) [ad25f11ed216d5ce3b5566b2f187b59fa3061b40]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in (3.14-rc1) [7053aee26a3548ebaba046ae2e52396ccf56ac6c]"
-sid: pending (4.12.6-1)
+sid: released (4.12.6-1)
 4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/dentry-name-snapshots.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u3) [bugfix/all/dentry-name-snapshots.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-7541
===================================================================
--- active/CVE-2017-7541	2017-08-13 04:33:51 UTC (rev 5474)
+++ active/CVE-2017-7541	2017-08-13 15:59:51 UTC (rev 5475)
@@ -8,7 +8,7 @@
 4.9-upstream-stable: released (4.9.39) [414848bba6ab91fe12ca8105b4652c4aa6f4b574]
 3.16-upstream-stable: pending
 3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.12.6-1)
+sid: released (4.12.6-1)
 4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u3) [bugfix/all/brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-7542
===================================================================
--- active/CVE-2017-7542	2017-08-13 04:33:51 UTC (rev 5474)
+++ active/CVE-2017-7542	2017-08-13 15:59:51 UTC (rev 5475)
@@ -6,7 +6,7 @@
 4.9-upstream-stable: released (4.9.42) [4a2ffe1707e3787f93a7d0ff2dec682a57ba25ad]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.12.6-1)
+sid: released (4.12.6-1)
 4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u3) [bugfix/all/ipv6-avoid-overflow-of-offset-in-ip6_find_1stfragopt.patch]
 3.2-wheezy-security: needed

Modified: active/CVE-2017-8831
===================================================================
--- active/CVE-2017-8831	2017-08-13 04:33:51 UTC (rev 5474)
+++ active/CVE-2017-8831	2017-08-13 15:59:51 UTC (rev 5475)
@@ -9,7 +9,7 @@
 4.9-upstream-stable: released (4.9.42) [12d17d78e3f74b5022f61eee7d6de082e472a401]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.12.6-1)
+sid: released (4.12.6-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed
 3.2-wheezy-security: needed




More information about the kernel-sec-discuss mailing list