[kernel-sec-discuss] r3979 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Fri Oct 30 18:00:26 UTC 2015


Author: jmm
Date: 2015-10-30 18:00:26 +0000 (Fri, 30 Oct 2015)
New Revision: 3979

Modified:
   active/CVE-2015-2925
   active/CVE-2015-5257
   active/CVE-2015-7613
   active/CVE-2015-7872
Log:
fixes from 3.16.7-ckt19


Modified: active/CVE-2015-2925
===================================================================
--- active/CVE-2015-2925	2015-10-29 08:19:02 UTC (rev 3978)
+++ active/CVE-2015-2925	2015-10-30 18:00:26 UTC (rev 3979)
@@ -21,5 +21,5 @@
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u4) [bugfix/all/namei-lift-open-coded-terminate_walk-in-follow_dotdo.patch, bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-f.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u5) [bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-from-their-mnt_root.patch]
 2.6.32-squeeze-security: released (2.6.32-48squeeze16) [bugfix/all/dcache-handle-escaped-paths-in-prepend_path.patch, bugfix/all/vfs-test-for-and-handle-paths-that-are-unreachable-from-their-mnt_root.patch]
-3.16-upstream-stable: pending (3.16.7-ckt19) [a75ff8a85153c785ff1ba70ba2a652f6c1f99a5b, 15b1989605d51fb1efb3728ba68e417c4ee02afb]
+3.16-upstream-stable: released (3.16.7-ckt19) [a75ff8a85153c785ff1ba70ba2a652f6c1f99a5b, 15b1989605d51fb1efb3728ba68e417c4ee02afb]
 3.2-upstream-stable: released (3.2.72) [dcache-handle-escaped-paths-in-prepend_path.patch, vfs-test-for-and-handle-paths-that-are-unreachable-from-their-mnt_root.patch]

Modified: active/CVE-2015-5257
===================================================================
--- active/CVE-2015-5257	2015-10-29 08:19:02 UTC (rev 3978)
+++ active/CVE-2015-5257	2015-10-30 18:00:26 UTC (rev 3979)
@@ -5,7 +5,7 @@
 Notes:
 Bugs:
 upstream: released (4.3-rc3) [cbb4be652d374f64661137756b8f357a1827d6a4]
-3.16-upstream-stable: pending (3.16.7-ckt19) [73e6391770a65856100661b56bcfa4b37bd0a98e]
+3.16-upstream-stable: released (3.16.7-ckt19) [73e6391770a65856100661b56bcfa4b37bd0a98e]
 3.2-upstream-stable: released (3.2.72) [usb-whiteheat-fix-potential-null-deref-at-probe.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.2.1-1) [bugfix/all/usb-whiteheat-fix-potential-null-deref-at-probe.patch]

Modified: active/CVE-2015-7613
===================================================================
--- active/CVE-2015-7613	2015-10-29 08:19:02 UTC (rev 3978)
+++ active/CVE-2015-7613	2015-10-30 18:00:26 UTC (rev 3979)
@@ -6,7 +6,7 @@
  bwh> Both squeeze and wheezy have this issue.
 Bugs:
 upstream: released (v4.3-rc4) [b9a532277938798b53178d5a66af6e2915cb27cf]
-3.16-upstream-stable: needed
+3.16-upstream-stable: released (3.16.7-ckt19)
 3.2-upstream-stable: released (3.2.72) [initialize-msg-shm-ipc-objects-before-doing-ipc_addid.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.2.3-1) [bugfix/all/Initialize-msg-shm-IPC-objects-before-doing-ipc_addid.patch]

Modified: active/CVE-2015-7872
===================================================================
--- active/CVE-2015-7872	2015-10-29 08:19:02 UTC (rev 3978)
+++ active/CVE-2015-7872	2015-10-30 18:00:26 UTC (rev 3979)
@@ -6,7 +6,7 @@
  https://bugzilla.redhat.com/show_bug.cgi?id=1272371
  https://bugzilla.redhat.com/show_bug.cgi?id=1272172
 upstream: released (v4.3-rc7) [f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61]
-3.16-upstream-stable: needed
+3.16-upstream-stable: released (3.16.7-ckt19)
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: N/A "vulnerable code not present"
 sid: released (4.2.5-1) [bugfix/all/KEYS-Fix-crash-when-attempt-to-garbage-collect-an-un.patch]




More information about the kernel-sec-discuss mailing list