[kernel-sec-discuss] r3954 - active

Ben Hutchings benh at moszumanska.debian.org
Wed Oct 7 22:57:05 UTC 2015


Author: benh
Date: 2015-10-07 22:57:05 +0000 (Wed, 07 Oct 2015)
New Revision: 3954

Modified:
   active/CVE-2015-0272
   active/CVE-2015-2925
   active/CVE-2015-5156
   active/CVE-2015-5257
   active/CVE-2015-5697
   active/CVE-2015-6937
   active/CVE-2015-7613
Log:
Mark issues pending for 3.2

Modified: active/CVE-2015-0272
===================================================================
--- active/CVE-2015-0272	2015-10-06 20:09:00 UTC (rev 3953)
+++ active/CVE-2015-0272	2015-10-07 22:57:05 UTC (rev 3954)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (v4.0-rc3) [77751427a1ff25b27d47a4c36b12c3c8667855ac]
 3.16-upstream-stable: released (3.16.7-ckt18)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.72) [ipv6-addrconf-validate-new-mtu-before-applying-it.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.0.2-1)
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/ipv6-addrconf-validate-new-MTU-before-applying-it.patch]

Modified: active/CVE-2015-2925
===================================================================
--- active/CVE-2015-2925	2015-10-06 20:09:00 UTC (rev 3953)
+++ active/CVE-2015-2925	2015-10-07 22:57:05 UTC (rev 3954)
@@ -22,4 +22,4 @@
 3.2-wheezy-security: needed
 2.6.32-squeeze-security: needed
 3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.72) [dcache-handle-escaped-paths-in-prepend_path.patch, vfs-test-for-and-handle-paths-that-are-unreachable-from-their-mnt_root.patch]

Modified: active/CVE-2015-5156
===================================================================
--- active/CVE-2015-5156	2015-10-06 20:09:00 UTC (rev 3953)
+++ active/CVE-2015-5156	2015-10-07 22:57:05 UTC (rev 3954)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (4.2-rc7) [48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39]
 3.16-upstream-stable: released (3.16.7-ckt18)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.72) [virtio-net-drop-netif_f_fraglist.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.1.5-1) [bugfix/all/virtio-net-drop-netif_f_fraglist.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/virtio-net-drop-netif_f_fraglist.patch]

Modified: active/CVE-2015-5257
===================================================================
--- active/CVE-2015-5257	2015-10-06 20:09:00 UTC (rev 3953)
+++ active/CVE-2015-5257	2015-10-07 22:57:05 UTC (rev 3954)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: needed
 3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.72) [usb-whiteheat-fix-potential-null-deref-at-probe.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.2.1-1) [bugfix/all/usb-whiteheat-fix-potential-null-deref-at-probe.patch]
 3.16-jessie-security: pending (3.16.7-ckt11+deb8u5) [bugfix/all/usb-whiteheat-fix-potential-null-deref-at-probe.patch]

Modified: active/CVE-2015-5697
===================================================================
--- active/CVE-2015-5697	2015-10-06 20:09:00 UTC (rev 3953)
+++ active/CVE-2015-5697	2015-10-07 22:57:05 UTC (rev 3954)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (4.2-rc6) [b6878d9e03043695dbf3fa1caa6dfc09db225b16]
 3.16-upstream-stable: released (3.16.7-ckt17)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.72) [md-use-kzalloc-when-bitmap-is-disabled.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.1.3-1) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]

Modified: active/CVE-2015-6937
===================================================================
--- active/CVE-2015-6937	2015-10-06 20:09:00 UTC (rev 3953)
+++ active/CVE-2015-6937	2015-10-07 22:57:05 UTC (rev 3954)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (v4.3-rc1) [74e98eb085889b0d2d4908f59f6e00026063014f]
 3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.72) [rds-verify-the-underlying-transport-exists-before-creating-a.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.2.1-1) [bugfix/all/rds-verify-the-underlying-transport-exists-before-cr.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/rds-verify-the-underlying-transport-exists-before-cr.patch]

Modified: active/CVE-2015-7613
===================================================================
--- active/CVE-2015-7613	2015-10-06 20:09:00 UTC (rev 3953)
+++ active/CVE-2015-7613	2015-10-07 22:57:05 UTC (rev 3954)
@@ -7,7 +7,7 @@
 Bugs:
 upstream: released (v4.3-rc4) [b9a532277938798b53178d5a66af6e2915cb27cf]
 3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.72) [initialize-msg-shm-ipc-objects-before-doing-ipc_addid.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.2.3-1) [bugfix/all/Initialize-msg-shm-IPC-objects-before-doing-ipc_addid.patch]
 3.16-jessie-security: pending (3.16.7-ckt11-1+deb8u5) [bugfix/all/Initialize-msg-shm-IPC-objects-before-doing-ipc_addid.patch]




More information about the kernel-sec-discuss mailing list