[kernel-sec-discuss] r5656 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sun Oct 15 13:39:52 UTC 2017


Author: carnil
Date: 2017-10-15 13:39:52 +0000 (Sun, 15 Oct 2017)
New Revision: 5656

Modified:
   active/CVE-2017-0786
   active/CVE-2017-1000255
   active/CVE-2017-12188
   active/CVE-2017-12192
   active/CVE-2017-15265
   active/CVE-2017-5123
Log:
Mark 4.13.4-2 as released

Modified: active/CVE-2017-0786
===================================================================
--- active/CVE-2017-0786	2017-10-15 06:33:35 UTC (rev 5655)
+++ active/CVE-2017-0786	2017-10-15 13:39:52 UTC (rev 5656)
@@ -6,7 +6,7 @@
 4.9-upstream-stable: released (4.9.55) [4d3132d97aa753104ee35722352a895750a0fca5]
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.13.4-2) [bugfix/all/brcmfmac-add-length-check-in-brcmf_cfg80211_escan_ha.patch]
+sid: released (4.13.4-2) [bugfix/all/brcmfmac-add-length-check-in-brcmf_cfg80211_escan_ha.patch]
 4.9-stretch-security: needed
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-1000255
===================================================================
--- active/CVE-2017-1000255	2017-10-15 06:33:35 UTC (rev 5655)
+++ active/CVE-2017-1000255	2017-10-15 13:39:52 UTC (rev 5656)
@@ -13,7 +13,7 @@
 4.9-upstream-stable: released (4.9.55) [afebf5ef60da6d15e75398e41ea2817c7a2bb283]
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.9-rc1 with 5d176f751ee3c6eededd984ad409bff201f436a7"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.9-rc1 with 5d176f751ee3c6eededd984ad409bff201f436a7"
-sid: pending (4.13.4-2) [bugfix/all/powerpc-64s-Use-emergency-stack-for-kernel-TM-Bad-Th.patch]
+sid: released (4.13.4-2) [bugfix/all/powerpc-64s-Use-emergency-stack-for-kernel-TM-Bad-Th.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: N/A "Vulerable code introduced later"
 3.2-wheezy-security: N/A "Vulerable code introduced later"

Modified: active/CVE-2017-12188
===================================================================
--- active/CVE-2017-12188	2017-10-15 06:33:35 UTC (rev 5655)
+++ active/CVE-2017-12188	2017-10-15 13:39:52 UTC (rev 5656)
@@ -14,7 +14,7 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.13.4-2) [bugfix/x86/KVM-nVMX-update-last_nonleaf_level-when-initializing.patch, bugfix/x86/KVM-MMU-always-terminate-page-walks-at-level-1.patch]
+sid: released (4.13.4-2) [bugfix/x86/KVM-nVMX-update-last_nonleaf_level-when-initializing.patch, bugfix/x86/KVM-MMU-always-terminate-page-walks-at-level-1.patch]
 4.9-stretch-security: needed
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-12192
===================================================================
--- active/CVE-2017-12192	2017-10-15 06:33:35 UTC (rev 5655)
+++ active/CVE-2017-12192	2017-10-15 13:39:52 UTC (rev 5656)
@@ -7,7 +7,7 @@
 4.9-upstream-stable: released (4.9.53) [dda70d28c0ac191f128bfd3acfd800667ed86bdf]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced later in 3.13-rc1"
-sid: pending (4.13.4-2) [bugfix/all/KEYS-prevent-KEYCTL_READ-on-negative-key.patch]
+sid: released (4.13.4-2) [bugfix/all/KEYS-prevent-KEYCTL_READ-on-negative-key.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-15265
===================================================================
--- active/CVE-2017-15265	2017-10-15 06:33:35 UTC (rev 5655)
+++ active/CVE-2017-15265	2017-10-15 13:39:52 UTC (rev 5656)
@@ -9,7 +9,7 @@
 4.9-upstream-stable:
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.13.4-2) [bugfix/all/ALSA-seq-Fix-use-after-free-at-creating-a-port.patch]
+sid: released (4.13.4-2) [bugfix/all/ALSA-seq-Fix-use-after-free-at-creating-a-port.patch]
 4.9-stretch-security:
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-5123
===================================================================
--- active/CVE-2017-5123	2017-10-15 06:33:35 UTC (rev 5655)
+++ active/CVE-2017-5123	2017-10-15 13:39:52 UTC (rev 5656)
@@ -6,7 +6,7 @@
 4.9-upstream-stable: N/A "Vulnerable code introduced in 4.13-rc1 with 4c48abe91be03d191d0c20cc755877da2cb35622"
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.13-rc1 with 4c48abe91be03d191d0c20cc755877da2cb35622"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.13-rc1 with 4c48abe91be03d191d0c20cc755877da2cb35622"
-sid: pending (4.13.4-2) [bugfix/all/waitid-Add-missing-access_ok-checks.patch]
+sid: released (4.13.4-2) [bugfix/all/waitid-Add-missing-access_ok-checks.patch]
 4.9-stretch-security: N/A "Vulnerable code not present"
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"




More information about the kernel-sec-discuss mailing list