[kernel-sec-discuss] r5400 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Mon Jul 3 07:18:46 UTC 2017


Author: carnil
Date: 2017-07-03 07:18:46 +0000 (Mon, 03 Jul 2017)
New Revision: 5400

Modified:
   active/CVE-2014-9940
   active/CVE-2017-1000364
   active/CVE-2017-7346
   active/CVE-2017-7482
   active/CVE-2017-7518
Log:
Mark 3.2.90 and 3.16.45 as released, track upstream comits

Modified: active/CVE-2014-9940
===================================================================
--- active/CVE-2014-9940	2017-07-01 04:49:22 UTC (rev 5399)
+++ active/CVE-2014-9940	2017-07-03 07:18:46 UTC (rev 5400)
@@ -7,7 +7,7 @@
 Bugs:
 upstream: released (3.19-rc1) [60a2362f769cf549dc466134efe71c8bf9fbaaba]
 4.9-upstream-stable: N/A "Fixed before branching point"
-3.16-upstream-stable: pending (3.16.45) [regulator-core-fix-regualtor_ena_gpio_free-not-to-access-pin-after.patch]
+3.16-upstream-stable: released (3.16.45) [702f4dd27ccf3bae7915ef1f8790db3af435d211]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.0.2-1)
 4.9-stretch-security: N/A "Fixed before branching point"

Modified: active/CVE-2017-1000364
===================================================================
--- active/CVE-2017-1000364	2017-07-01 04:49:22 UTC (rev 5399)
+++ active/CVE-2017-1000364	2017-07-03 07:18:46 UTC (rev 5400)
@@ -8,8 +8,8 @@
 Bugs:
 upstream: released (4.12-rc6) [1be7107fbe18eed3e319a6c3e83c78254b693acb]
 4.9-upstream-stable: released (4.9.34) [cfc0eb403816c5c4f9667d959de5e22789b5421e]
-3.16-upstream-stable: pending (3.16.45) [mm-larger-stack-guard-gap-between-vmas.patch]
-3.2-upstream-stable: pending (3.2.90) [mm-larger-stack-guard-gap-between-vmas.patch]
+3.16-upstream-stable: released (3.16.45) [978b8aa1646d4e023edd121c7f1b8f938ccb813d]
+3.2-upstream-stable: released (3.2.90) [640c7dfdc7c723143b1ce42f5569ec8565cbbde7]
 sid: released (4.11.6-1) [bugfix/all/mm-larger-stack-guard-gap-between-vmas.patch]
 4.9-stretch-security: released (4.9.30-2+deb9u1)
 3.16-jessie-security: released (3.16.43-2+deb8u1)

Modified: active/CVE-2017-7346
===================================================================
--- active/CVE-2017-7346	2017-07-01 04:49:22 UTC (rev 5399)
+++ active/CVE-2017-7346	2017-07-03 07:18:46 UTC (rev 5400)
@@ -10,7 +10,7 @@
 Bugs:
 upstream: released (4.12-rc5) [ee9c4e681ec4f58e42a83cb0c22a0289ade1aacf]
 4.9-upstream-stable: released (4.9.32) [a76ff847013a7f6b1cd328381ca263ddcca12061]
-3.16-upstream-stable: pending (3.16.45) [drm-vmwgfx-limit-the-number-of-mip-levels-in.patch]
+3.16-upstream-stable: released (3.16.45) [7943d19453aa1a1acf93bdb2812e0bef970ec23c]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.11.6-1)
 4.9-stretch-security: needed

Modified: active/CVE-2017-7482
===================================================================
--- active/CVE-2017-7482	2017-07-01 04:49:22 UTC (rev 5399)
+++ active/CVE-2017-7482	2017-07-03 07:18:46 UTC (rev 5400)
@@ -7,8 +7,8 @@
 Bugs:
 upstream: released (4.12-rc7) [5f2f97656ada8d811d3c1bef503ced266fcd53a0]
 4.9-upstream-stable: released (4.9.35) [f2060387421109ac389dd209355918b566fc6f84]
-3.16-upstream-stable: pending (3.2.90) [rxrpc-fix-several-cases-where-a-padded-len-isn-t-checked-in-ticket.patch]
-3.2-upstream-stable: pending (3.16.45) [rxrpc-fix-several-cases-where-a-padded-len-isn-t-checked-in-ticket.patch]
+3.16-upstream-stable: released (3.16.45) [e3378be9d9cbe1f77ecfc03b4350991be58f3f82]
+3.2-upstream-stable: released (3.2.90) [09c9faacebb3c1e279ec962cff3072995328ca29]
 sid: pending (4.11.8-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-7518
===================================================================
--- active/CVE-2017-7518	2017-07-01 04:49:22 UTC (rev 5399)
+++ active/CVE-2017-7518	2017-07-03 07:18:46 UTC (rev 5400)
@@ -9,7 +9,7 @@
  https://bugzilla.redhat.com/show_bug.cgi?id=1464473
 upstream: released (4.12-rc7) [c8401dda2f0a00cd25c0af6a95ed50e478d25de4]
 4.9-upstream-stable: needed
-3.16-upstream-stable: pending (3.16.45) [kvm-x86-fix-singlestepping-over-syscall.patch]
+3.16-upstream-stable: released (3.16.45) [24ee2a286de7ac680ad4b2423c2dcee68444e567]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: pending (4.11.8-1)
 4.9-stretch-security: needed




More information about the kernel-sec-discuss mailing list