[kernel-sec-discuss] r5260 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Tue May 2 19:40:45 UTC 2017
Author: carnil
Date: 2017-05-02 19:40:45 +0000 (Tue, 02 May 2017)
New Revision: 5260
Modified:
active/CVE-2016-9604
active/CVE-2017-2671
active/CVE-2017-7374
active/CVE-2017-7472
active/CVE-2017-7616
active/CVE-2017-7618
active/CVE-2017-7645
active/CVE-2017-7889
active/CVE-2017-7895
active/CVE-2017-8061
active/CVE-2017-8063
active/CVE-2017-8064
active/CVE-2017-8067
Log:
mark 4.9.25-1 as released (tagged in packaging git repo)
Modified: active/CVE-2016-9604
===================================================================
--- active/CVE-2016-9604 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2016-9604 2017-05-02 19:40:45 UTC (rev 5260)
@@ -10,6 +10,6 @@
4.9-upstream-stable: released (4.9.25) [a5c6e0a76817a3751f58d761aaff7c0b0c4001ff]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.9.25-1)
+sid: released (4.9.25-1)
3.16-jessie-security: pending (3.16.43-1) [bugfix/all/keys-disallow-keyrings-beginning-with-.-to-be-joined.patch]
3.2-wheezy-security: released (3.2.88-1) [bugfix/all/keys-disallow-keyrings-beginning-with-.-to-be-joined.patch]
Modified: active/CVE-2017-2671
===================================================================
--- active/CVE-2017-2671 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-2671 2017-05-02 19:40:45 UTC (rev 5260)
@@ -9,6 +9,6 @@
4.9-upstream-stable: needed
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.9.25-1) [bugfix/all/ping-implement-proper-locking.patch]
+sid: released (4.9.25-1) [bugfix/all/ping-implement-proper-locking.patch]
3.16-jessie-security: pending (3.16.43-1) [bugfix/all/ping-implement-proper-locking.patch]
3.2-wheezy-security: released (3.2.88-1) [bugfix/all/ping-implement-proper-locking.patch]
Modified: active/CVE-2017-7374
===================================================================
--- active/CVE-2017-7374 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-7374 2017-05-02 19:40:45 UTC (rev 5260)
@@ -8,6 +8,6 @@
4.9-upstream-stable: released (4.9.20) [2984e52c75c657db7901f6189f02e0251ca963c2]
3.16-upstream-stable: N/A "Intoduced in 4.2-rc1 with b7236e21d55ff9008737621c84dd8ee6c37c7c6d"
3.2-upstream-stable: N/A "Intoduced in 4.2-rc1 with b7236e21d55ff9008737621c84dd8ee6c37c7c6d"
-sid: pending (4.9.25-1)
+sid: released (4.9.25-1)
3.16-jessie-security: N/A "Vulnerable code not present"
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-7472
===================================================================
--- active/CVE-2017-7472 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-7472 2017-05-02 19:40:45 UTC (rev 5260)
@@ -11,6 +11,6 @@
4.9-upstream-stable: released (4.9.25) [174a74dbca2ddc7269c265598399c000e5b9b870]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.9.25-1)
+sid: released (4.9.25-1)
3.16-jessie-security: pending (3.16.43-1) [bugfix/all/keys-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch]
3.2-wheezy-security: released (3.2.88-1) [bugfix/all/keys-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch]
Modified: active/CVE-2017-7616
===================================================================
--- active/CVE-2017-7616 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-7616 2017-05-02 19:40:45 UTC (rev 5260)
@@ -11,6 +11,6 @@
4.9-upstream-stable: released (4.9.22) [cddab768d13469d1e254fb8c0e1629f93c8dfaca]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.9.25-1)
+sid: released (4.9.25-1)
3.16-jessie-security: pending (3.16.43-1) [bugfix/all/mm-mempolicy.c-fix-error-handling-in-set_mempolicy-a.patch]
3.2-wheezy-security: released (3.2.88-1) [bugfix/all/mm-mempolicy.c-fix-error-handling-in-set_mempolicy-a.patch]
Modified: active/CVE-2017-7618
===================================================================
--- active/CVE-2017-7618 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-7618 2017-05-02 19:40:45 UTC (rev 5260)
@@ -12,6 +12,6 @@
4.9-upstream-stable: released (4.9.24) [c10479591869177ae7ac0570b54ace6fbdeb57c2]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.9.25-1)
+sid: released (4.9.25-1)
3.16-jessie-security: pending (3.16.43-1) [bugfix/all/crypto-ahash-fix-einprogress-notification-callback.patch]
3.2-wheezy-security: released (3.2.88-1) [bugfix/all/crypto-ahash-fix-einprogress-notification-callback.patch]
Modified: active/CVE-2017-7645
===================================================================
--- active/CVE-2017-7645 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-7645 2017-05-02 19:40:45 UTC (rev 5260)
@@ -19,6 +19,6 @@
4.9-upstream-stable: needed
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.9.25-1) [bugfix/all/nfsd-check-for-oversized-NFSv2-v3-arguments.patch]
+sid: released (4.9.25-1) [bugfix/all/nfsd-check-for-oversized-NFSv2-v3-arguments.patch]
3.16-jessie-security: needed
3.2-wheezy-security: needed
Modified: active/CVE-2017-7889
===================================================================
--- active/CVE-2017-7889 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-7889 2017-05-02 19:40:45 UTC (rev 5260)
@@ -11,6 +11,6 @@
4.9-upstream-stable: released (4.9.24) [2c0ad235ac77f2fc2eee593bf06822cad772e0e2]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.9.25-1)
+sid: released (4.9.25-1)
3.16-jessie-security: needed
3.2-wheezy-security: needed
Modified: active/CVE-2017-7895
===================================================================
--- active/CVE-2017-7895 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-7895 2017-05-02 19:40:45 UTC (rev 5260)
@@ -8,6 +8,6 @@
4.9-upstream-stable: needed
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.9.25-1) [bugfix/all/nfsd-stricter-decoding-of-write-like-NFSv2-v3-ops.patch]
+sid: released (4.9.25-1) [bugfix/all/nfsd-stricter-decoding-of-write-like-NFSv2-v3-ops.patch]
3.16-jessie-security: needed
3.2-wheezy-security: needed
Modified: active/CVE-2017-8061
===================================================================
--- active/CVE-2017-8061 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-8061 2017-05-02 19:40:45 UTC (rev 5260)
@@ -6,6 +6,6 @@
4.9-upstream-stable: released (4.9.24) [28d1e8b7ef81d254583f68627095f8a85e39597d]
3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-sid: pending (4.9.25-1)
+sid: released (4.9.25-1)
3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
Modified: active/CVE-2017-8063
===================================================================
--- active/CVE-2017-8063 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-8063 2017-05-02 19:40:45 UTC (rev 5260)
@@ -6,6 +6,6 @@
4.9-upstream-stable: released (4.9.24) ([fb00319317c152bf3528df13a54c28bf8c5daa55]
3.16-upstream-stable: N/A "introduced in 4.9-rc4 with 17ce039b4e54"
3.2-upstream-stable: N/A "introduced in 4.9-rc4 with 17ce039b4e54"
-sid: pending (4.9.25-1)
+sid: released (4.9.25-1)
3.16-jessie-security: N/A "Vulnerable code not present"
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-8064
===================================================================
--- active/CVE-2017-8064 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-8064 2017-05-02 19:40:45 UTC (rev 5260)
@@ -8,6 +8,6 @@
4.9-upstream-stable: released (4.9.24) [1992564156b5dc4ac73418e5b95e1a43f12f3cb1]
3.16-upstream-stable: needed
3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.9.25-1)
+sid: released (4.9.25-1)
3.16-jessie-security: needed
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-8067
===================================================================
--- active/CVE-2017-8067 2017-05-02 19:19:03 UTC (rev 5259)
+++ active/CVE-2017-8067 2017-05-02 19:40:45 UTC (rev 5260)
@@ -6,6 +6,6 @@
4.9-upstream-stable: released (4.9.24) [86c6667f6a5f6bdb392d8ffbe58fbcbcf6db2704]
3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-sid: pending (4.9.25-1)
+sid: released (4.9.25-1)
3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
More information about the kernel-sec-discuss
mailing list