[kernel-sec-discuss] r5720 - active

Ben Hutchings benh at moszumanska.debian.org
Thu Nov 16 17:45:07 UTC 2017


Author: benh
Date: 2017-11-16 17:45:06 +0000 (Thu, 16 Nov 2017)
New Revision: 5720

Modified:
   active/CVE-2017-12193
   active/CVE-2017-13080
   active/CVE-2017-15115
   active/CVE-2017-15306
   active/CVE-2017-16532
   active/CVE-2017-16643
Log:
Mark issues pending in sid, version 4.13.13-1

Modified: active/CVE-2017-12193
===================================================================
--- active/CVE-2017-12193	2017-11-16 14:24:17 UTC (rev 5719)
+++ active/CVE-2017-12193	2017-11-16 17:45:06 UTC (rev 5720)
@@ -6,7 +6,7 @@
 4.9-upstream-stable: released (4.9.60) [67bcc5e530d55e646b7324038c926c2bde735a7e]
 3.16-upstream-stable: released (3.16.50) [c42ab77ec3454fc0d9710bd6734e241e4202d8b3]
 3.2-upstream-stable: N/A "Introduced in 3.13-rc1 with 3cb989501c2688cacbb7dc4b0d353faf838f53a1"
-sid: pending (4.13.12-1)
+sid: pending (4.13.13-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-13080
===================================================================
--- active/CVE-2017-13080	2017-11-16 14:24:17 UTC (rev 5719)
+++ active/CVE-2017-13080	2017-11-16 17:45:06 UTC (rev 5720)
@@ -10,7 +10,7 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: released (3.16.50) [a0a8a11d1630cd648dc1ce86da620b4e240e0315]
 3.2-upstream-stable: released (3.2.95) [ef810e7c3d2a8fb3bbd23726599c487c30ea747e]
-sid: pending (4.13.12-1) [bugfix/all/mac80211-accept-key-reinstall-without-changing-anyth.patch]
+sid: pending (4.13.13-1) [bugfix/all/mac80211-accept-key-reinstall-without-changing-anyth.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-15115
===================================================================
--- active/CVE-2017-15115	2017-11-16 14:24:17 UTC (rev 5719)
+++ active/CVE-2017-15115	2017-11-16 17:45:06 UTC (rev 5720)
@@ -6,7 +6,7 @@
 4.9-upstream-stable:
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.13.12-1) [bugfix/all/sctp-do-not-peel-off-an-assoc-from-one-netns-to-anot.patch]
+sid: pending (4.13.13-1) [bugfix/all/sctp-do-not-peel-off-an-assoc-from-one-netns-to-anot.patch]
 4.9-stretch-security:
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-15306
===================================================================
--- active/CVE-2017-15306	2017-11-16 14:24:17 UTC (rev 5719)
+++ active/CVE-2017-15306	2017-11-16 17:45:06 UTC (rev 5720)
@@ -6,7 +6,7 @@
 4.9-upstream-stable: released (4.9.60) [474cb9e0f02fdabadfc5ecc17b9afbb0ca6aa15a]
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.8-rc1 with 23528bb21ee2c9b27f3feddd77a2a3351a8df148"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.8-rc1 with 23528bb21ee2c9b27f3feddd77a2a3351a8df148"
-sid: pending (4.13.12-1)
+sid: pending (4.13.13-1)
 4.9-stretch-security: needed
 3.16-jessie-security: N/A "Vulnerable code introduced later"
 3.2-wheezy-security: N/A "Vulnerable code introduced later"

Modified: active/CVE-2017-16532
===================================================================
--- active/CVE-2017-16532	2017-11-16 14:24:17 UTC (rev 5719)
+++ active/CVE-2017-16532	2017-11-16 17:45:06 UTC (rev 5720)
@@ -7,7 +7,7 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: released (3.16.50) [824f2a5ccdd9ddfb53418c13f493aa46ae0c2c00]
 3.2-upstream-stable: released (3.2.95) [f2a780301ae85dbe704499675832487130b8e267]
-sid: needed
+sid: pending (4.13.13-1) [bugfix/all/usb-usbtest-fix-NULL-pointer-dereference.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-16643
===================================================================
--- active/CVE-2017-16643	2017-11-16 14:24:17 UTC (rev 5719)
+++ active/CVE-2017-16643	2017-11-16 17:45:06 UTC (rev 5720)
@@ -8,7 +8,7 @@
 4.9-upstream-stable: released (4.9.60) [52f65e35c2b85908fa66cfc265be4e3fd88744a3]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.13.12-1)
+sid: pending (4.13.13-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed
 3.2-wheezy-security: needed




More information about the kernel-sec-discuss mailing list