[kernel-sec-discuss] r5771 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sat Dec 9 08:48:02 UTC 2017


Author: carnil
Date: 2017-12-09 08:48:01 +0000 (Sat, 09 Dec 2017)
New Revision: 5771

Modified:
   active/CVE-2017-0786
   active/CVE-2017-1000255
   active/CVE-2017-1000405
   active/CVE-2017-12188
   active/CVE-2017-12190
   active/CVE-2017-12192
   active/CVE-2017-12193
   active/CVE-2017-13080
   active/CVE-2017-15115
   active/CVE-2017-15265
   active/CVE-2017-15299
   active/CVE-2017-15306
   active/CVE-2017-15537
   active/CVE-2017-15649
   active/CVE-2017-15951
   active/CVE-2017-16525
   active/CVE-2017-16526
   active/CVE-2017-16527
   active/CVE-2017-16528
   active/CVE-2017-16529
   active/CVE-2017-16530
   active/CVE-2017-16531
   active/CVE-2017-16532
   active/CVE-2017-16533
   active/CVE-2017-16534
   active/CVE-2017-16535
   active/CVE-2017-16536
   active/CVE-2017-16537
   active/CVE-2017-16643
   active/CVE-2017-16645
   active/CVE-2017-16646
   active/CVE-2017-16647
   active/CVE-2017-16649
   active/CVE-2017-16650
   active/CVE-2017-16939
   active/CVE-2017-16994
Log:
mark 4.9.65-1 as released

Modified: active/CVE-2017-0786
===================================================================
--- active/CVE-2017-0786	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-0786	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable: released (3.16.50) [7df83adfc5d38bf960ef7ff0e4cb1c2c92715f63]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.13.4-2) [bugfix/all/brcmfmac-add-length-check-in-brcmf_cfg80211_escan_ha.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-1000255
===================================================================
--- active/CVE-2017-1000255	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-1000255	2017-12-09 08:48:01 UTC (rev 5771)
@@ -14,6 +14,6 @@
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.9-rc1 with 5d176f751ee3c6eededd984ad409bff201f436a7"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.9-rc1 with 5d176f751ee3c6eededd984ad409bff201f436a7"
 sid: released (4.13.4-2) [bugfix/all/powerpc-64s-Use-emergency-stack-for-kernel-TM-Bad-Th.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: N/A "Vulerable code introduced later"
 3.2-wheezy-security: N/A "Vulerable code introduced later"

Modified: active/CVE-2017-1000405
===================================================================
--- active/CVE-2017-1000405	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-1000405	2017-12-09 08:48:01 UTC (rev 5771)
@@ -12,6 +12,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: released (4.14.2-1) [bugfix/all/mm-thp-Do-not-make-page-table-dirty-unconditionally-.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: needed

Modified: active/CVE-2017-12188
===================================================================
--- active/CVE-2017-12188	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-12188	2017-12-09 08:48:01 UTC (rev 5771)
@@ -16,6 +16,6 @@
 3.16-upstream-stable: N/A "Vulnerable code not present"
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.13.4-2) [bugfix/x86/KVM-nVMX-update-last_nonleaf_level-when-initializing.patch, bugfix/x86/KVM-MMU-always-terminate-page-walks-at-level-1.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-12190
===================================================================
--- active/CVE-2017-12190	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-12190	2017-12-09 08:48:01 UTC (rev 5771)
@@ -15,6 +15,6 @@
 3.16-upstream-stable: released (3.16.50) [3c885aa3b459aabc5fa04251a5fdd88e29b1de70]
 3.2-upstream-stable: released (3.2.95) [9ff5d8fe36745867da8a028b3ea58629f7546155]
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-12192
===================================================================
--- active/CVE-2017-12192	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-12192	2017-12-09 08:48:01 UTC (rev 5771)
@@ -8,6 +8,6 @@
 3.16-upstream-stable: released (3.16.50) [3eab231a5b5382067ab3ead172780144f9c0f721]
 3.2-upstream-stable: N/A "Vulnerable code introduced later in 3.13-rc1"
 sid: released (4.13.4-2) [bugfix/all/KEYS-prevent-KEYCTL_READ-on-negative-key.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-12193
===================================================================
--- active/CVE-2017-12193	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-12193	2017-12-09 08:48:01 UTC (rev 5771)
@@ -7,6 +7,6 @@
 3.16-upstream-stable: released (3.16.50) [c42ab77ec3454fc0d9710bd6734e241e4202d8b3]
 3.2-upstream-stable: N/A "Introduced in 3.13-rc1 with 3cb989501c2688cacbb7dc4b0d353faf838f53a1"
 sid: released (4.13.13-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-13080
===================================================================
--- active/CVE-2017-13080	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-13080	2017-12-09 08:48:01 UTC (rev 5771)
@@ -13,6 +13,6 @@
 3.16-upstream-stable: released (3.16.50) [a0a8a11d1630cd648dc1ce86da620b4e240e0315]
 3.2-upstream-stable: released (3.2.95) [ef810e7c3d2a8fb3bbd23726599c487c30ea747e]
 sid: released (4.13.13-1) [bugfix/all/mac80211-accept-key-reinstall-without-changing-anyth.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-15115
===================================================================
--- active/CVE-2017-15115	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-15115	2017-12-09 08:48:01 UTC (rev 5771)
@@ -7,6 +7,6 @@
 3.16-upstream-stable: released (3.16.51) [7adde0289baa8d51c2bd072d80cb82a278d24363]
 3.2-upstream-stable: released (3.2.96) [sctp-do-not-peel-off-an-assoc-from-one-netns-to-another-one.patch]
 sid: released (4.13.13-1) [16585babafe54375f23f73a8fc323bd51e7955d7]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-15265
===================================================================
--- active/CVE-2017-15265	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-15265	2017-12-09 08:48:01 UTC (rev 5771)
@@ -14,6 +14,6 @@
 3.16-upstream-stable: released (3.16.50) [853c65fe1db498563bdeea5b7e733441db34d330]
 3.2-upstream-stable: released (3.2.95) [c3895a053b2505f9e409e6d6c57dcece714ab486]
 sid: released (4.13.4-2) [bugfix/all/ALSA-seq-Fix-use-after-free-at-creating-a-port.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-15299
===================================================================
--- active/CVE-2017-15299	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-15299	2017-12-09 08:48:01 UTC (rev 5771)
@@ -18,6 +18,6 @@
 3.16-upstream-stable: released (3.16.50) [24832178de3ab7b6fb42f2730d8d675e3d30adb2]
 3.2-upstream-stable: released (3.2.95) [57f94e88bb255bf7b7d267c999aefbe4557307c1]
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-15306
===================================================================
--- active/CVE-2017-15306	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-15306	2017-12-09 08:48:01 UTC (rev 5771)
@@ -7,6 +7,6 @@
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.8-rc1 with 23528bb21ee2c9b27f3feddd77a2a3351a8df148"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.8-rc1 with 23528bb21ee2c9b27f3feddd77a2a3351a8df148"
 sid: released (4.13.13-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: N/A "Vulnerable code introduced later"
 3.2-wheezy-security: N/A "Vulnerable code introduced later"

Modified: active/CVE-2017-15537
===================================================================
--- active/CVE-2017-15537	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-15537	2017-12-09 08:48:01 UTC (rev 5771)
@@ -8,6 +8,6 @@
 3.16-upstream-stable: N/A "Vulnerable code introduced in 3.17-rc1"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.17-rc1"
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: N/A "Vulnerable code introduced later"
 3.2-wheezy-security: N/A "Vulnerable code introduced later"

Modified: active/CVE-2017-15649
===================================================================
--- active/CVE-2017-15649	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-15649	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable: released (3.16.50) [4839233c04cd9ffb65fa00bdb473cbdac427d45f, 70abad3796f52ed593d5d31bf9f0b5410a522548]
 3.2-upstream-stable: released (3.2.95) [b2e1f10f138c6cc03a2f5c940b6c4963b07c7296, ca3d015d39f0357889fa3ef6a88028162de17d7d]
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-15951
===================================================================
--- active/CVE-2017-15951	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-15951	2017-12-09 08:48:01 UTC (rev 5771)
@@ -8,6 +8,6 @@
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.4-rc1 with 146aa8b1453bd8f1ff2304ffb71b4ee0eb9acdcc"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.4-rc1 with 146aa8b1453bd8f1ff2304ffb71b4ee0eb9acdcc"
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: N/A "Vulnerable code introduced later"
 3.2-wheezy-security: N/A "Vulnerable code introduced later"

Modified: active/CVE-2017-16525
===================================================================
--- active/CVE-2017-16525	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16525	2017-12-09 08:48:01 UTC (rev 5771)
@@ -12,6 +12,6 @@
 3.16-upstream-stable: released (3.16.51) [96b62489bc4200803cb77a0ca69aa3d179c7e9f5]
 3.2-upstream-stable: released (3.2.96) [b92072aadd839c9379190979edac63285ae2b790]
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16526
===================================================================
--- active/CVE-2017-16526	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16526	2017-12-09 08:48:01 UTC (rev 5771)
@@ -11,6 +11,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-16527
===================================================================
--- active/CVE-2017-16527	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16527	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable: released (3.16.50) [6a6488e8d231fa1fca2408e59e819f64fecb45f3]
 3.2-upstream-stable: released (3.2.95) [72f4b1c7114c1b34302999d72bc5b16c8c1a1945]
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16528
===================================================================
--- active/CVE-2017-16528	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16528	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable: N/A "Vulnerable code not present"
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.13.4-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-16529
===================================================================
--- active/CVE-2017-16529	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16529	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable: released (3.16.50) [9992800cfd0b367369407d62a4c228c454c5d0e3]
 3.2-upstream-stable: released (3.2.95) [8a930044f0b100d6b28a94525e9cf62787b3ec3a]
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16530
===================================================================
--- active/CVE-2017-16530	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16530	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable: released (3.16.50) [c0003557dbdec4ec1976ea7be9534abef758297b]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-16531
===================================================================
--- active/CVE-2017-16531	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16531	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable: released (3.16.50) [cc81fff9d62e32a27b1f16dab1a6172935792ab7]
 3.2-upstream-stable: released (3.2.95) [a0e0a5850211dd09725c819a8915c2cbe9067317]
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16532
===================================================================
--- active/CVE-2017-16532	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16532	2017-12-09 08:48:01 UTC (rev 5771)
@@ -8,6 +8,6 @@
 3.16-upstream-stable: released (3.16.50) [824f2a5ccdd9ddfb53418c13f493aa46ae0c2c00]
 3.2-upstream-stable: released (3.2.95) [f2a780301ae85dbe704499675832487130b8e267]
 sid: released (4.13.13-1) [bugfix/all/usb-usbtest-fix-NULL-pointer-dereference.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16533
===================================================================
--- active/CVE-2017-16533	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16533	2017-12-09 08:48:01 UTC (rev 5771)
@@ -8,6 +8,6 @@
 3.16-upstream-stable: released (3.16.50) [8d675aa967d3927ac100f7af48f2a2af8a041d2d]
 3.2-upstream-stable: released (3.2.95) [99de0781e0de7c866f762b931351c2a501c3074f]
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16534
===================================================================
--- active/CVE-2017-16534	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16534	2017-12-09 08:48:01 UTC (rev 5771)
@@ -11,6 +11,6 @@
 3.16-upstream-stable: N/A "Vulnerable code not present"
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-16535
===================================================================
--- active/CVE-2017-16535	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16535	2017-12-09 08:48:01 UTC (rev 5771)
@@ -8,6 +8,6 @@
 3.16-upstream-stable: released (3.16.50) [6514189e83d470af2f35735038c1b096410ab98d]
 3.2-upstream-stable: released (3.2.95) [7c27b82fad16d2804c7c8405316a636f57edeabd]
 sid: released (4.13.10-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16536
===================================================================
--- active/CVE-2017-16536	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16536	2017-12-09 08:48:01 UTC (rev 5771)
@@ -10,6 +10,6 @@
 3.16-upstream-stable: released (3.16.51) [99a3c1bb0ed332c64cfcd53a84fea2468ab9e11e]
 3.2-upstream-stable: released (3.2.96) [59a7195cd497d430d9f76bc9f71cf53ed4102743]
 sid: released (4.13.13-1) [bugfix/all/media-cx231xx-cards-fix-null-deref-on-missing-associ.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16537
===================================================================
--- active/CVE-2017-16537	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16537	2017-12-09 08:48:01 UTC (rev 5771)
@@ -10,6 +10,6 @@
 3.16-upstream-stable: released (3.16.51) [7f3ca02c7ed55f7d524fb5c06e2de36ab65f5e20]
 3.2-upstream-stable: released (3.2.96) [0df873c63e8e99a8fb6e068d182b860e6e6e07a9]
 sid: released (4.13.13-1) [bugfix/all/media-imon-fix-null-ptr-deref-in-imon_probe.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16643
===================================================================
--- active/CVE-2017-16643	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16643	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable: released (3.16.51) [9d399eba105c6e311db9ec78ce62579ffc403c0d]
 3.2-upstream-stable: released (3.2.96) [2de544fd1b16f76f8dd1213d585ce611155ccd34]
 sid: released (4.13.13-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16645
===================================================================
--- active/CVE-2017-16645	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16645	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.14.2-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-16646
===================================================================
--- active/CVE-2017-16646	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16646	2017-12-09 08:48:01 UTC (rev 5771)
@@ -10,6 +10,6 @@
 3.16-upstream-stable: N/A "Vulnerable code not present"
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.13.13-1) [bugfix/all/media-dib0700-fix-invalid-dvb_detach-argument.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-16647
===================================================================
--- active/CVE-2017-16647	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16647	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable: N/A "Vulnerable code not present"
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.13.13-1) [bugfix/all/net-usb-asix-fill-null-ptr-deref-in-asix_suspend.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-16649
===================================================================
--- active/CVE-2017-16649	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16649	2017-12-09 08:48:01 UTC (rev 5771)
@@ -10,6 +10,6 @@
 3.16-upstream-stable: released (3.16.51) [fac4f4657e16d3457963d4c8ee6a356103155141]
 3.2-upstream-stable: released (3.2.96) [d7d24810ac55e2f3fb213d6acf80016a0d337c50]
 sid: released (4.13.13-1) [bugfix/all/net-cdc_ether-fix-divide-by-0-on-bad-descriptors.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: pending (3.2.96-1)

Modified: active/CVE-2017-16650
===================================================================
--- active/CVE-2017-16650	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16650	2017-12-09 08:48:01 UTC (rev 5771)
@@ -10,6 +10,6 @@
 3.16-upstream-stable: released (3.16.51) [4a14bd934b40b1a9f7fe3e0546f9873bb55e5b61]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.13.13-1) [bugfix/all/net-qmi_wwan-fix-divide-by-0-on-bad-descriptors.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-16939
===================================================================
--- active/CVE-2017-16939	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16939	2017-12-09 08:48:01 UTC (rev 5771)
@@ -9,6 +9,6 @@
 3.16-upstream-stable:
 3.2-upstream-stable:
 sid: released (4.13.13-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-16994
===================================================================
--- active/CVE-2017-16994	2017-12-09 08:43:22 UTC (rev 5770)
+++ active/CVE-2017-16994	2017-12-09 08:48:01 UTC (rev 5771)
@@ -8,6 +8,6 @@
 3.16-upstream-stable:
 3.2-upstream-stable:
 sid: released (4.14.2-1)
-4.9-stretch-security: needed
+4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security:
 3.2-wheezy-security:




More information about the kernel-sec-discuss mailing list