[kernel-sec-discuss] r3962 - active

Ben Hutchings benh at moszumanska.debian.org
Wed Oct 14 01:40:43 UTC 2015


Author: benh
Date: 2015-10-14 01:40:43 +0000 (Wed, 14 Oct 2015)
New Revision: 3962

Modified:
   active/CVE-2015-0272
   active/CVE-2015-2925
   active/CVE-2015-5156
   active/CVE-2015-5257
   active/CVE-2015-5697
   active/CVE-2015-6937
   active/CVE-2015-7613
Log:
Mark 3.2.72 as released

Modified: active/CVE-2015-0272
===================================================================
--- active/CVE-2015-0272	2015-10-13 09:53:04 UTC (rev 3961)
+++ active/CVE-2015-0272	2015-10-14 01:40:43 UTC (rev 3962)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (v4.0-rc3) [77751427a1ff25b27d47a4c36b12c3c8667855ac]
 3.16-upstream-stable: released (3.16.7-ckt18)
-3.2-upstream-stable: pending (3.2.72) [ipv6-addrconf-validate-new-mtu-before-applying-it.patch]
+3.2-upstream-stable: released (3.2.72) [ipv6-addrconf-validate-new-mtu-before-applying-it.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.0.2-1)
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/ipv6-addrconf-validate-new-MTU-before-applying-it.patch]

Modified: active/CVE-2015-2925
===================================================================
--- active/CVE-2015-2925	2015-10-13 09:53:04 UTC (rev 3961)
+++ active/CVE-2015-2925	2015-10-14 01:40:43 UTC (rev 3962)
@@ -22,4 +22,4 @@
 3.2-wheezy-security: released (3.2.68-1+deb7u5) [bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-from-their-mnt_root.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze16) [bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-from-their-mnt_root.patch]
 3.16-upstream-stable: needed
-3.2-upstream-stable: pending (3.2.72) [dcache-handle-escaped-paths-in-prepend_path.patch, vfs-test-for-and-handle-paths-that-are-unreachable-from-their-mnt_root.patch]
+3.2-upstream-stable: released (3.2.72) [dcache-handle-escaped-paths-in-prepend_path.patch, vfs-test-for-and-handle-paths-that-are-unreachable-from-their-mnt_root.patch]

Modified: active/CVE-2015-5156
===================================================================
--- active/CVE-2015-5156	2015-10-13 09:53:04 UTC (rev 3961)
+++ active/CVE-2015-5156	2015-10-14 01:40:43 UTC (rev 3962)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (4.2-rc7) [48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39]
 3.16-upstream-stable: released (3.16.7-ckt18)
-3.2-upstream-stable: pending (3.2.72) [virtio-net-drop-netif_f_fraglist.patch]
+3.2-upstream-stable: released (3.2.72) [virtio-net-drop-netif_f_fraglist.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.1.5-1) [bugfix/all/virtio-net-drop-netif_f_fraglist.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/virtio-net-drop-netif_f_fraglist.patch]

Modified: active/CVE-2015-5257
===================================================================
--- active/CVE-2015-5257	2015-10-13 09:53:04 UTC (rev 3961)
+++ active/CVE-2015-5257	2015-10-14 01:40:43 UTC (rev 3962)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (4.3-rc3) [cbb4be652d374f64661137756b8f357a1827d6a4]
 3.16-upstream-stable: needed
-3.2-upstream-stable: pending (3.2.72) [usb-whiteheat-fix-potential-null-deref-at-probe.patch]
+3.2-upstream-stable: released (3.2.72) [usb-whiteheat-fix-potential-null-deref-at-probe.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.2.1-1) [bugfix/all/usb-whiteheat-fix-potential-null-deref-at-probe.patch]
 3.16-jessie-security: released (3.16.7-ckt11+deb8u5) [bugfix/all/usb-whiteheat-fix-potential-null-deref-at-probe.patch]

Modified: active/CVE-2015-5697
===================================================================
--- active/CVE-2015-5697	2015-10-13 09:53:04 UTC (rev 3961)
+++ active/CVE-2015-5697	2015-10-14 01:40:43 UTC (rev 3962)
@@ -5,7 +5,7 @@
 Bugs:
 upstream: released (4.2-rc6) [b6878d9e03043695dbf3fa1caa6dfc09db225b16]
 3.16-upstream-stable: released (3.16.7-ckt17)
-3.2-upstream-stable: pending (3.2.72) [md-use-kzalloc-when-bitmap-is-disabled.patch]
+3.2-upstream-stable: released (3.2.72) [md-use-kzalloc-when-bitmap-is-disabled.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.1.3-1) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u3) [bugfix/all/md-use-kzalloc-when-bitmap-is-disabled.patch]

Modified: active/CVE-2015-6937
===================================================================
--- active/CVE-2015-6937	2015-10-13 09:53:04 UTC (rev 3961)
+++ active/CVE-2015-6937	2015-10-14 01:40:43 UTC (rev 3962)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (v4.3-rc1) [74e98eb085889b0d2d4908f59f6e00026063014f]
 3.16-upstream-stable: released (3.16.7-ckt18) [a93002fa8bd6495b88ae9196151008902d7e7774]
-3.2-upstream-stable: pending (3.2.72) [rds-verify-the-underlying-transport-exists-before-creating-a.patch]
+3.2-upstream-stable: released (3.2.72) [rds-verify-the-underlying-transport-exists-before-creating-a.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.2.1-1) [bugfix/all/rds-verify-the-underlying-transport-exists-before-cr.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/rds-verify-the-underlying-transport-exists-before-cr.patch]

Modified: active/CVE-2015-7613
===================================================================
--- active/CVE-2015-7613	2015-10-13 09:53:04 UTC (rev 3961)
+++ active/CVE-2015-7613	2015-10-14 01:40:43 UTC (rev 3962)
@@ -7,7 +7,7 @@
 Bugs:
 upstream: released (v4.3-rc4) [b9a532277938798b53178d5a66af6e2915cb27cf]
 3.16-upstream-stable: needed
-3.2-upstream-stable: pending (3.2.72) [initialize-msg-shm-ipc-objects-before-doing-ipc_addid.patch]
+3.2-upstream-stable: released (3.2.72) [initialize-msg-shm-ipc-objects-before-doing-ipc_addid.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.2.3-1) [bugfix/all/Initialize-msg-shm-IPC-objects-before-doing-ipc_addid.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u5) [bugfix/all/Initialize-msg-shm-IPC-objects-before-doing-ipc_addid.patch]




More information about the kernel-sec-discuss mailing list