[kernel-sec-discuss] r5545 - active

Ben Hutchings benh at moszumanska.debian.org
Fri Sep 15 17:35:34 UTC 2017


Author: benh
Date: 2017-09-15 17:35:34 +0000 (Fri, 15 Sep 2017)
New Revision: 5545

Modified:
   active/CVE-2017-11600
   active/CVE-2017-12134
   active/CVE-2017-14106
   active/CVE-2017-14140
   active/CVE-2017-7541
Log:
Mark 3.2.93 and 3.16.48 as released

Modified: active/CVE-2017-11600
===================================================================
--- active/CVE-2017-11600	2017-09-14 06:31:05 UTC (rev 5544)
+++ active/CVE-2017-11600	2017-09-15 17:35:34 UTC (rev 5545)
@@ -10,8 +10,8 @@
 Bugs:
 upstream: released (4.13) [7bab09631c2a303f87a7eb7e3d69e888673b9b7e]
 4.9-upstream-stable: released (4.9.48) [12a70ccaa6868163487f9a5ad97e1a91a397b453]
-3.16-upstream-stable: pending (3.16.48) [xfrm-policy-check-policy-direction-value.patch]
-3.2-upstream-stable: pending (3.2.93) [xfrm-policy-check-policy-direction-value.patch]
+3.16-upstream-stable: released (3.16.48) [xfrm-policy-check-policy-direction-value.patch]
+3.2-upstream-stable: released (3.2.93) [xfrm-policy-check-policy-direction-value.patch]
 sid: released (4.12.6-1) [bugfix/all/xfrm-policy-check-policy-direction-value.patch]
 4.9-stretch-security: pending (4.9.30-2+deb9u4) [bugfix/all/xfrm-policy-check-policy-direction-value.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u4) [bugfix/all/xfrm-policy-check-policy-direction-value.patch]

Modified: active/CVE-2017-12134
===================================================================
--- active/CVE-2017-12134	2017-09-14 06:31:05 UTC (rev 5544)
+++ active/CVE-2017-12134	2017-09-15 17:35:34 UTC (rev 5545)
@@ -5,8 +5,8 @@
 Bugs: #866511
 upstream: released (4.13-rc6) [462cdace790ac2ed6aad1b19c9c0af0143b6aab0]
 4.9-upstream-stable: released (4.9.45) [6c7f3756d072050d612e5c5c04108f90f1985435]
-3.16-upstream-stable: pending (3.16.48) [xen-fix-bio-vec-merging.patch]
-3.2-upstream-stable: pending (3.2.93) [xen-fix-bio-vec-merging.patch]
+3.16-upstream-stable: released (3.16.48) [xen-fix-bio-vec-merging.patch]
+3.2-upstream-stable: released (3.2.93) [xen-fix-bio-vec-merging.patch]
 sid: released (4.12.12-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-14106
===================================================================
--- active/CVE-2017-14106	2017-09-14 06:31:05 UTC (rev 5544)
+++ active/CVE-2017-14106	2017-09-15 17:35:34 UTC (rev 5545)
@@ -7,8 +7,8 @@
 Bugs:
 upstream: released (4.12-rc3) [499350a5a6e7512d9ed369ed63a4244b6536f4f8]
 4.9-upstream-stable: needed
-3.16-upstream-stable: pending (3.16.48) [tcp-initialize-rcv_mss-to-tcp_min_mss-instead-of-0.patch]
-3.2-upstream-stable: pending (3.2.93) [tcp-initialize-rcv_mss-to-tcp_min_mss-instead-of-0.patch]
+3.16-upstream-stable: released (3.16.48) [tcp-initialize-rcv_mss-to-tcp_min_mss-instead-of-0.patch]
+3.2-upstream-stable: released (3.2.93) [tcp-initialize-rcv_mss-to-tcp_min_mss-instead-of-0.patch]
 sid: released (4.12.6-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-14140
===================================================================
--- active/CVE-2017-14140	2017-09-14 06:31:05 UTC (rev 5544)
+++ active/CVE-2017-14140	2017-09-15 17:35:34 UTC (rev 5545)
@@ -4,8 +4,8 @@
 Bugs:
 upstream: released (4.13-rc6) [197e7e521384a23b9e585178f3f11c9fa08274b9]
 4.9-upstream-stable: released (4.9.45) [61332dc598c3f223678b2d7192ccf3472c544799]
-3.16-upstream-stable: pending (3.16.48) [sanitize-move_pages-permission-checks.patch]
-3.2-upstream-stable: pending (3.2.93) [sanitize-move_pages-permission-checks.patch]
+3.16-upstream-stable: released (3.16.48) [sanitize-move_pages-permission-checks.patch]
+3.2-upstream-stable: released (3.2.93) [sanitize-move_pages-permission-checks.patch]
 sid: released (4.12.12-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-7541
===================================================================
--- active/CVE-2017-7541	2017-09-14 06:31:05 UTC (rev 5544)
+++ active/CVE-2017-7541	2017-09-15 17:35:34 UTC (rev 5545)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (4.13-rc1) [8f44c9a41386729fea410e688959ddaa9d51be7c]
 4.9-upstream-stable: released (4.9.39) [414848bba6ab91fe12ca8105b4652c4aa6f4b574]
-3.16-upstream-stable: pending (3.16.48) [brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80211_mgmt_tx.patch]
+3.16-upstream-stable: released (3.16.48) [brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80211_mgmt_tx.patch]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.12.6-1)
 4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80.patch]




More information about the kernel-sec-discuss mailing list