[kernel-sec-discuss] r5387 - active
Ben Hutchings
benh at moszumanska.debian.org
Tue Jun 27 02:39:12 UTC 2017
Author: benh
Date: 2017-06-27 02:39:12 +0000 (Tue, 27 Jun 2017)
New Revision: 5387
Modified:
active/CVE-2014-9940
active/CVE-2017-1000364
active/CVE-2017-7346
active/CVE-2017-7482
active/CVE-2017-7518
Log:
Mark issues pending for 3.{2,16}-upstream-stable
Modified: active/CVE-2014-9940
===================================================================
--- active/CVE-2014-9940 2017-06-27 02:38:48 UTC (rev 5386)
+++ active/CVE-2014-9940 2017-06-27 02:39:12 UTC (rev 5387)
@@ -7,7 +7,7 @@
Bugs:
upstream: released (3.19-rc1) [60a2362f769cf549dc466134efe71c8bf9fbaaba]
4.9-upstream-stable: N/A "Fixed before branching point"
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.45) [regulator-core-fix-regualtor_ena_gpio_free-not-to-access-pin-after.patch]
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.0.2-1)
4.9-stretch-security: N/A "Fixed before branching point"
Modified: active/CVE-2017-1000364
===================================================================
--- active/CVE-2017-1000364 2017-06-27 02:38:48 UTC (rev 5386)
+++ active/CVE-2017-1000364 2017-06-27 02:39:12 UTC (rev 5387)
@@ -8,8 +8,8 @@
Bugs:
upstream: released (4.12-rc6) [1be7107fbe18eed3e319a6c3e83c78254b693acb]
4.9-upstream-stable: released (4.9.34) [cfc0eb403816c5c4f9667d959de5e22789b5421e]
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.45) [mm-larger-stack-guard-gap-between-vmas.patch]
+3.2-upstream-stable: pending (3.2.90) [mm-larger-stack-guard-gap-between-vmas.patch]
sid: released (4.11.6-1) [bugfix/all/mm-larger-stack-guard-gap-between-vmas.patch]
4.9-stretch-security: released (4.9.30-2+deb9u1)
3.16-jessie-security: released (3.16.43-2+deb8u1)
Modified: active/CVE-2017-7346
===================================================================
--- active/CVE-2017-7346 2017-06-27 02:38:48 UTC (rev 5386)
+++ active/CVE-2017-7346 2017-06-27 02:39:12 UTC (rev 5387)
@@ -10,7 +10,7 @@
Bugs:
upstream: released (4.12-rc5) [ee9c4e681ec4f58e42a83cb0c22a0289ade1aacf]
4.9-upstream-stable: released (4.9.32) [a76ff847013a7f6b1cd328381ca263ddcca12061]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.45) [drm-vmwgfx-limit-the-number-of-mip-levels-in.patch]
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.11.6-1)
4.9-stretch-security: needed
Modified: active/CVE-2017-7482
===================================================================
--- active/CVE-2017-7482 2017-06-27 02:38:48 UTC (rev 5386)
+++ active/CVE-2017-7482 2017-06-27 02:39:12 UTC (rev 5387)
@@ -7,8 +7,8 @@
Bugs:
upstream: released (4.12-rc7) [5f2f97656ada8d811d3c1bef503ced266fcd53a0]
4.9-upstream-stable: needed
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.16-upstream-stable: pending (3.2.90) [rxrpc-fix-several-cases-where-a-padded-len-isn-t-checked-in-ticket.patch]
+3.2-upstream-stable: pending (3.16.45) [rxrpc-fix-several-cases-where-a-padded-len-isn-t-checked-in-ticket.patch]
sid: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
Modified: active/CVE-2017-7518
===================================================================
--- active/CVE-2017-7518 2017-06-27 02:38:48 UTC (rev 5386)
+++ active/CVE-2017-7518 2017-06-27 02:39:12 UTC (rev 5387)
@@ -9,7 +9,7 @@
https://bugzilla.redhat.com/show_bug.cgi?id=1464473
upstream: released (4.12-rc7) [c8401dda2f0a00cd25c0af6a95ed50e478d25de4]
4.9-upstream-stable: needed
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.45) [kvm-x86-fix-singlestepping-over-syscall.patch]
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: needed
4.9-stretch-security: needed
More information about the kernel-sec-discuss
mailing list