[kernel-sec-discuss] r5419 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Mon Jul 17 19:39:23 UTC 2017
Author: carnil
Date: 2017-07-17 19:39:22 +0000 (Mon, 17 Jul 2017)
New Revision: 5419
Modified:
active/CVE-2017-1000365
active/CVE-2017-1000370
active/CVE-2017-1000371
active/CVE-2017-10810
active/CVE-2017-10911
active/CVE-2017-11176
active/CVE-2017-7482
active/CVE-2017-7518
Log:
Mark 4.11.11-1 as released in sid
Modified: active/CVE-2017-1000365
===================================================================
--- active/CVE-2017-1000365 2017-07-16 20:26:12 UTC (rev 5418)
+++ active/CVE-2017-1000365 2017-07-17 19:39:22 UTC (rev 5419)
@@ -8,7 +8,7 @@
4.9-upstream-stable: released (4.9.35) [3d6848e491df6abbf5fb5b1fabb7a5df2e2b8f4f]
3.16-upstream-stable: pending (3.16.46) [fs-exec.c-account-for-argv-envp-pointers.patch]
3.2-upstream-stable: pending (3.2.91) [fs-exec.c-account-for-argv-envp-pointers.patch]
-sid: pending (4.11.11-1)
+sid: released (4.11.11-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
3.2-wheezy-security: needed
Modified: active/CVE-2017-1000370
===================================================================
--- active/CVE-2017-1000370 2017-07-16 20:26:12 UTC (rev 5418)
+++ active/CVE-2017-1000370 2017-07-17 19:39:22 UTC (rev 5419)
@@ -10,7 +10,7 @@
4.9-upstream-stable: needed
3.16-upstream-stable: N/A "Memory layout is different"
3.2-upstream-stable: N/A "Memory layout is different"
-sid: pending (4.11.11-1) [bugfix/all/binfmt_elf-use-elf_et_dyn_base-only-for-pie.patch]
+sid: released (4.11.11-1) [bugfix/all/binfmt_elf-use-elf_et_dyn_base-only-for-pie.patch]
4.9-stretch-security: needed
3.16-jessie-security: needed
3.2-wheezy-security: N/A "Memory layout is different"
Modified: active/CVE-2017-1000371
===================================================================
--- active/CVE-2017-1000371 2017-07-16 20:26:12 UTC (rev 5418)
+++ active/CVE-2017-1000371 2017-07-17 19:39:22 UTC (rev 5419)
@@ -10,7 +10,7 @@
4.9-upstream-stable: needed
3.16-upstream-stable: N/A "Memory layout is different"
3.2-upstream-stable: N/A "Memory layout is different"
-sid: pending (4.11.11-1) [bugfix/all/binfmt_elf-use-elf_et_dyn_base-only-for-pie.patch]
+sid: released (4.11.11-1) [bugfix/all/binfmt_elf-use-elf_et_dyn_base-only-for-pie.patch]
4.9-stretch-security: needed
3.16-jessie-security: needed
3.2-wheezy-security: N/A "Memory layout is different"
Modified: active/CVE-2017-10810
===================================================================
--- active/CVE-2017-10810 2017-07-16 20:26:12 UTC (rev 5418)
+++ active/CVE-2017-10810 2017-07-17 19:39:22 UTC (rev 5419)
@@ -7,6 +7,6 @@
3.16-upstream-stable: N/A "Vulnerable code not present"
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: needed
-4.9-stretch-security: pending (4.11.11-1)
+4.9-stretch-security: released (4.11.11-1)
3.16-jessie-security: N/A "Vulnerable code not present"
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-10911
===================================================================
--- active/CVE-2017-10911 2017-07-16 20:26:12 UTC (rev 5418)
+++ active/CVE-2017-10911 2017-07-17 19:39:22 UTC (rev 5419)
@@ -7,7 +7,7 @@
4.9-upstream-stable: released (4.9.35) [4ae2cb91a6365a6472fad7f04785cc0420ea5ada]
3.16-upstream-stable: pending (3.16.46) [xen-blkback-don-t-leak-stack-data-via-response-ring.patch]
3.2-upstream-stable: pending (3.2.91) [xen-blkback-don-t-leak-stack-data-via-response-ring.patch]
-sid: pending (4.11.11-1)
+sid: released (4.11.11-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
3.2-wheezy-security: needed
Modified: active/CVE-2017-11176
===================================================================
--- active/CVE-2017-11176 2017-07-16 20:26:12 UTC (rev 5418)
+++ active/CVE-2017-11176 2017-07-17 19:39:22 UTC (rev 5419)
@@ -8,7 +8,7 @@
4.9-upstream-stable: released (4.9.38) [e6952841ade0f937750c7748a812cb403bd744b0]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.11.11-1)
+sid: released (4.11.11-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
3.2-wheezy-security: needed
Modified: active/CVE-2017-7482
===================================================================
--- active/CVE-2017-7482 2017-07-16 20:26:12 UTC (rev 5418)
+++ active/CVE-2017-7482 2017-07-17 19:39:22 UTC (rev 5419)
@@ -9,7 +9,7 @@
4.9-upstream-stable: released (4.9.35) [f2060387421109ac389dd209355918b566fc6f84]
3.16-upstream-stable: released (3.16.45) [e3378be9d9cbe1f77ecfc03b4350991be58f3f82]
3.2-upstream-stable: released (3.2.90) [09c9faacebb3c1e279ec962cff3072995328ca29]
-sid: pending (4.11.11-1)
+sid: released (4.11.11-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
3.2-wheezy-security: pending (3.2.90-1)
Modified: active/CVE-2017-7518
===================================================================
--- active/CVE-2017-7518 2017-07-16 20:26:12 UTC (rev 5418)
+++ active/CVE-2017-7518 2017-07-17 19:39:22 UTC (rev 5419)
@@ -11,7 +11,7 @@
4.9-upstream-stable: needed
3.16-upstream-stable: released (3.16.45) [24ee2a286de7ac680ad4b2423c2dcee68444e567]
3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.11.11-1)
+sid: released (4.11.11-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
3.2-wheezy-security: N/A "Vulnerable code not present"
More information about the kernel-sec-discuss
mailing list