[kernel-sec-discuss] r5028 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Mon Feb 27 20:38:15 UTC 2017


Author: carnil
Date: 2017-02-27 20:38:15 +0000 (Mon, 27 Feb 2017)
New Revision: 5028

Modified:
   active/CVE-2017-2596
   active/CVE-2017-5669
   active/CVE-2017-5897
   active/CVE-2017-5967
   active/CVE-2017-6074
   active/CVE-2017-6214
   active/CVE-2017-6345
   active/CVE-2017-6346
   active/CVE-2017-6347
   active/CVE-2017-6348
   active/CVE-2017-6353
Log:
Mark 4.9.13-1 as released

Modified: active/CVE-2017-2596
===================================================================
--- active/CVE-2017-2596	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-2596	2017-02-27 20:38:15 UTC (rev 5028)
@@ -10,6 +10,6 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.9.13-1) [bugfix/x86/kvm-fix-page-struct-leak-in-handle_vmon.patch]
+sid: released (4.9.13-1) [bugfix/x86/kvm-fix-page-struct-leak-in-handle_vmon.patch]
 3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/x86/kvm-fix-page-struct-leak-in-handle_vmon.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-5669
===================================================================
--- active/CVE-2017-5669	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-5669	2017-02-27 20:38:15 UTC (rev 5028)
@@ -9,6 +9,6 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.13-1) [bugfix/all/ipc-shm-fix-shmat-mmap-nil-page-protection.patch]
+sid: released (4.9.13-1) [bugfix/all/ipc-shm-fix-shmat-mmap-nil-page-protection.patch]
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-5897
===================================================================
--- active/CVE-2017-5897	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-5897	2017-02-27 20:38:15 UTC (rev 5028)
@@ -6,6 +6,6 @@
 4.9-upstream-stable: released (4.9.11) [ae1768bbbc469b75662c6714957fe5886cc960c4]
 3.16-upstream-stable: released (3.16.41) [ip6_gre-fix-ip6gre_err-invalid-reads.patch]
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.7-rc1 with c12b395a46646bab69089ce7016ac78177f6001f"
-sid: pending (4.9.13-1)
+sid: released (4.9.13-1)
 3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/ip6_gre-fix-ip6gre_err-invalid-reads.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-5967
===================================================================
--- active/CVE-2017-5967	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-5967	2017-02-27 20:38:15 UTC (rev 5028)
@@ -12,6 +12,6 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: ignored "Upstream fix is not suitable for backporting"
 3.2-upstream-stable: ignored "Upstream fix is not suitable for backporting"
-sid: pending (4.9.13-1) [debian/time-mark-timer_stats-as-broken.patch]
+sid: released (4.9.13-1) [debian/time-mark-timer_stats-as-broken.patch]
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-6074
===================================================================
--- active/CVE-2017-6074	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-6074	2017-02-27 20:38:15 UTC (rev 5028)
@@ -7,6 +7,6 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: released (3.16.41) [dccp-fix-freeing-skb-too-early-for-ipv6_recvpktinfo.patch]
 3.2-upstream-stable: released (3.2.86) [dccp-fix-freeing-skb-too-early-for-ipv6_recvpktinfo.patch]
-sid: pending (4.9.13-1) [bugfix/all/dccp-fix-freeing-skb-too-early-for-IPV6_RECVPKTINFO.patch]
+sid: released (4.9.13-1) [bugfix/all/dccp-fix-freeing-skb-too-early-for-IPV6_RECVPKTINFO.patch]
 3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/dccp-fix-freeing-skb-too-early-for-IPV6_RECVPKTINFO.patch]
 3.2-wheezy-security: released (3.2.84-2) [bugfix/all/dccp-fix-freeing-skb-too-early-for-IPV6_RECVPKTINFO.patch]

Modified: active/CVE-2017-6214
===================================================================
--- active/CVE-2017-6214	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-6214	2017-02-27 20:38:15 UTC (rev 5028)
@@ -6,6 +6,6 @@
 4.9-upstream-stable: released (4.9.11) [0f895f51a831d73ce24158534784aba5b2a72a9e]
 3.16-upstream-stable: released (3.16.41) [tcp-avoid-infinite-loop-in-tcp_splice_read.patch]
 3.2-upstream-stable: released (3.2.86) [tcp-avoid-infinite-loop-in-tcp_splice_read.patch]
-sid: pending (4.9.13-1)
+sid: released (4.9.13-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-6345
===================================================================
--- active/CVE-2017-6345	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-6345	2017-02-27 20:38:15 UTC (rev 5028)
@@ -11,6 +11,6 @@
 4.9-upstream-stable: released (4.9.13) [42b52783a59cc706c71cdc7096edce4a6f086fd3]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.13-1)
+sid: released (4.9.13-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-6346
===================================================================
--- active/CVE-2017-6346	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-6346	2017-02-27 20:38:15 UTC (rev 5028)
@@ -8,6 +8,6 @@
 4.9-upstream-stable: released (4.9.13) [722737f27774b14be5a1d2d3b9281dcded7c48b2]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.13-1)
+sid: released (4.9.13-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-6347
===================================================================
--- active/CVE-2017-6347	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-6347	2017-02-27 20:38:15 UTC (rev 5028)
@@ -8,6 +8,6 @@
 4.9-upstream-stable: released (4.9.13) [481aedf869fbf2d4503ca0005dbd68b78422955a]
 3.16-upstream-stable: N/A "Vulnerable code not present"
 3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.9.13-1)
+sid: released (4.9.13-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-6348
===================================================================
--- active/CVE-2017-6348	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-6348	2017-02-27 20:38:15 UTC (rev 5028)
@@ -8,6 +8,6 @@
 4.9-upstream-stable: released (4.9.13) [c2219da51664451149350e47321aa0fcf72a8b8f]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.13-1)
+sid: released (4.9.13-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-6353
===================================================================
--- active/CVE-2017-6353	2017-02-27 20:38:13 UTC (rev 5027)
+++ active/CVE-2017-6353	2017-02-27 20:38:15 UTC (rev 5028)
@@ -12,6 +12,6 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.13-1) [bugfix/all/sctp-deny-peeloff-operation-on-asocs-with-threads-sl.patch]
+sid: released (4.9.13-1) [bugfix/all/sctp-deny-peeloff-operation-on-asocs-with-threads-sl.patch]
 3.16-jessie-security: needed
 3.2-wheezy-security: needed




More information about the kernel-sec-discuss mailing list