[kernel-sec-discuss] r5368 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Mon Jun 19 15:42:01 UTC 2017
Author: carnil
Date: 2017-06-19 15:42:01 +0000 (Mon, 19 Jun 2017)
New Revision: 5368
Modified:
active/CVE-2017-0605
active/CVE-2017-1000364
active/CVE-2017-7487
active/CVE-2017-7645
active/CVE-2017-7895
active/CVE-2017-8064
active/CVE-2017-8890
active/CVE-2017-8924
active/CVE-2017-8925
active/CVE-2017-9074
active/CVE-2017-9075
active/CVE-2017-9076
active/CVE-2017-9077
active/CVE-2017-9242
Log:
mark 3.16.43-2+deb8u1 and 4.9.30-2+deb9u1 as released
Modified: active/CVE-2017-0605
===================================================================
--- active/CVE-2017-0605 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-0605 2017-06-19 15:42:01 UTC (rev 5368)
@@ -21,5 +21,5 @@
3.2-upstream-stable: released (3.2.89) [e39e64193a8a611d11d4c62579a7246c1af70d1c]
sid: released (4.9.30-1) [bugfix/all/tracing-Use-strlcpy-instead-of-strcpy-in-__trace_fin.patch]
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/tracing-Use-strlcpy-instead-of-strcpy-in-__trace_fin.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/tracing-Use-strlcpy-instead-of-strcpy-in-__trace_fin.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-1000364
===================================================================
--- active/CVE-2017-1000364 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-1000364 2017-06-19 15:42:01 UTC (rev 5368)
@@ -7,6 +7,6 @@
3.16-upstream-stable: needed
3.2-upstream-stable: needed
sid: needed
-4.9-stretch-security: pending (4.9.30-2+deb9u1)
-3.16-jessie-security: pending (3.16.43-2+deb8u1)
+4.9-stretch-security: released (4.9.30-2+deb9u1)
+3.16-jessie-security: released (3.16.43-2+deb8u1)
3.2-wheezy-security: needed
Modified: active/CVE-2017-7487
===================================================================
--- active/CVE-2017-7487 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-7487 2017-06-19 15:42:01 UTC (rev 5368)
@@ -8,5 +8,5 @@
3.2-upstream-stable: released (3.2.89) [48dc185bcc73e1bb42d007cbaf96ad55cefaf4cb]
sid: released (4.9.30-1)
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipx-call-ipxitf_put-in-ioctl-error-path.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/ipx-call-ipxitf_put-in-ioctl-error-path.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-7645
===================================================================
--- active/CVE-2017-7645 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-7645 2017-06-19 15:42:01 UTC (rev 5368)
@@ -21,5 +21,5 @@
3.2-upstream-stable: released (3.2.89) [1eb3e42d91d63fc757a8da38683f417bcdf953a2]
sid: released (4.9.25-1) [bugfix/all/nfsd-check-for-oversized-NFSv2-v3-arguments.patch]
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/nfsd-check-for-oversized-nfsv2-v3-arguments.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/nfsd-check-for-oversized-nfsv2-v3-arguments.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-7895
===================================================================
--- active/CVE-2017-7895 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-7895 2017-06-19 15:42:01 UTC (rev 5368)
@@ -10,5 +10,5 @@
3.2-upstream-stable: released (3.2.89) [6b9ba0c00cb068a50a409bbdc7cfbe473f1c01a3]
sid: released (4.9.25-1) [bugfix/all/nfsd-stricter-decoding-of-write-like-NFSv2-v3-ops.patch]
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/nfsd-stricter-decoding-of-write-like-nfsv2-v3-ops.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/nfsd-stricter-decoding-of-write-like-nfsv2-v3-ops.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-8064
===================================================================
--- active/CVE-2017-8064 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-8064 2017-06-19 15:42:01 UTC (rev 5368)
@@ -10,5 +10,5 @@
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.9.25-1)
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/media-dvb-usb-v2-avoid-use-after-free.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/media-dvb-usb-v2-avoid-use-after-free.patch]
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-8890
===================================================================
--- active/CVE-2017-8890 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-8890 2017-06-19 15:42:01 UTC (rev 5368)
@@ -10,5 +10,5 @@
3.2-upstream-stable: released (3.2.89) [3d221359fedfc759661fb4a72804b6e798886e8f]
sid: released (4.9.30-1) [bugfix/all/dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-8924
===================================================================
--- active/CVE-2017-8924 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-8924 2017-06-19 15:42:01 UTC (rev 5368)
@@ -8,5 +8,5 @@
3.2-upstream-stable: released (3.2.89) [6d0c587048c85ca94723fc1bd900130cbe875eb3]
sid: released (4.9.16-1)
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/usb-serial-io_ti-fix-information-leak-in-completion-.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/usb-serial-io_ti-fix-information-leak-in-completion-.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-8925
===================================================================
--- active/CVE-2017-8925 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-8925 2017-06-19 15:42:01 UTC (rev 5368)
@@ -8,5 +8,5 @@
3.2-upstream-stable: released (3.2.89) [8b236342396140be22ab9b486c412666f161af78]
sid: released (4.9.16-1)
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/usb-serial-omninet-fix-reference-leaks-at-open.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/usb-serial-omninet-fix-reference-leaks-at-open.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-9074
===================================================================
--- active/CVE-2017-9074 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-9074 2017-06-19 15:42:01 UTC (rev 5368)
@@ -12,5 +12,5 @@
3.2-upstream-stable: released (3.2.89) [ad8a4d9d3f255a783d534a47d4b4ac611bb291d8]
sid: released (4.9.30-1) [bugfix/all/ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-9075
===================================================================
--- active/CVE-2017-9075 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-9075 2017-06-19 15:42:01 UTC (rev 5368)
@@ -8,5 +8,5 @@
3.2-upstream-stable: released (3.2.89) [cc1fa7814bdb7ebee2ee79bbce181c0783de9ad5]
sid: released (4.9.30-1) [bugfix/all/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-9076
===================================================================
--- active/CVE-2017-9076 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-9076 2017-06-19 15:42:01 UTC (rev 5368)
@@ -8,5 +8,5 @@
3.2-upstream-stable: released (3.2.89) [0767192a2c4ac9145a7e8fb00370963bc145a920]
sid: released (4.9.30-1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-9077
===================================================================
--- active/CVE-2017-9077 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-9077 2017-06-19 15:42:01 UTC (rev 5368)
@@ -8,5 +8,5 @@
3.2-upstream-stable: released (3.2.89) [0767192a2c4ac9145a7e8fb00370963bc145a920]
sid: released (4.9.30-1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
3.2-wheezy-security: pending (3.2.89-1)
Modified: active/CVE-2017-9242
===================================================================
--- active/CVE-2017-9242 2017-06-19 15:09:52 UTC (rev 5367)
+++ active/CVE-2017-9242 2017-06-19 15:42:01 UTC (rev 5368)
@@ -8,5 +8,5 @@
3.2-upstream-stable: released (3.2.89) [e5238fca9694d61861096d5fb80685c9f6581555]
sid: released (4.9.30-1) [bugfix/all/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
4.9-stretch-security: N/A "Fixed before branching point"
-3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
+3.16-jessie-security: released (3.16.43-2+deb8u1) [bugfix/all/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
3.2-wheezy-security: pending (3.2.89-1)
More information about the kernel-sec-discuss
mailing list