diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2017-01-14 12:12:00 +0000 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2017-01-14 12:12:00 +0000 |
commit | ffe83b224f9033a1aa67284ba75539c338b0b202 (patch) | |
tree | d1dd5d519ee05bf6ffb97ca531ffdf314283dd1a | |
parent | e90663b165fc994f73fbe3593f3c310ec96aeb2e (diff) |
Mark 3.16.39-1 as released
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@4835 e094ebfe-e918-0410-adfb-c712417f3574
-rw-r--r-- | active/CVE-2015-1350 | 2 | ||||
-rw-r--r-- | active/CVE-2015-8955 | 2 | ||||
-rw-r--r-- | active/CVE-2015-8962 | 2 | ||||
-rw-r--r-- | active/CVE-2015-8963 | 2 | ||||
-rw-r--r-- | active/CVE-2015-8964 | 2 | ||||
-rw-r--r-- | active/CVE-2016-10088 | 2 | ||||
-rw-r--r-- | active/CVE-2016-5412 | 2 | ||||
-rw-r--r-- | active/CVE-2016-7097 | 2 | ||||
-rw-r--r-- | active/CVE-2016-7910 | 2 | ||||
-rw-r--r-- | active/CVE-2016-7911 | 2 | ||||
-rw-r--r-- | active/CVE-2016-7912 | 2 | ||||
-rw-r--r-- | active/CVE-2016-7915 | 2 | ||||
-rw-r--r-- | active/CVE-2016-7917 | 2 | ||||
-rw-r--r-- | active/CVE-2016-8399 | 2 | ||||
-rw-r--r-- | active/CVE-2016-8633 | 2 | ||||
-rw-r--r-- | active/CVE-2016-8645 | 2 | ||||
-rw-r--r-- | active/CVE-2016-8650 | 2 | ||||
-rw-r--r-- | active/CVE-2016-8655 | 2 | ||||
-rw-r--r-- | active/CVE-2016-8658 | 2 | ||||
-rw-r--r-- | active/CVE-2016-9083 | 2 | ||||
-rw-r--r-- | active/CVE-2016-9084 | 2 | ||||
-rw-r--r-- | active/CVE-2016-9178 | 2 | ||||
-rw-r--r-- | active/CVE-2016-9555 | 2 | ||||
-rw-r--r-- | active/CVE-2016-9576 | 2 | ||||
-rw-r--r-- | active/CVE-2016-9754 | 2 | ||||
-rw-r--r-- | active/CVE-2016-9756 | 2 | ||||
-rw-r--r-- | active/CVE-2016-9793 | 2 | ||||
-rw-r--r-- | active/CVE-2016-9794 | 2 | ||||
-rw-r--r-- | active/CVE-2016-9806 | 2 |
29 files changed, 29 insertions, 29 deletions
diff --git a/active/CVE-2015-1350 b/active/CVE-2015-1350 index c4f64f275..a5f632cd2 100644 --- a/active/CVE-2015-1350 +++ b/active/CVE-2015-1350 @@ -10,7 +10,7 @@ Notes: Bugs: 770492 upstream: released (4.9-rc1) [030b533c4fd4d2ec3402363323de4bb2983c9cee] sid: released (4.8.11-1) [bugfix/all/xfs-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/ceph-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fuse-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fs-Give-dentry-to-inode_change_ok-instead-of-inode.patch, bugfix/all/fs-Avoid-premature-clearing-of-capabilities.patch] -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: released (3.2.84-1) 3.16-upstream-stable: released (3.16.39) [fs-give-dentry-to-inode_change_ok-instead-of-inode.patch, fs-avoid-premature-clearing-of-capabilities.patch] 3.2-upstream-stable: released (3.2.84) [fs-give-dentry-to-inode_change_ok-instead-of-inode.patch, fs-avoid-premature-clearing-of-capabilities.patch] diff --git a/active/CVE-2015-8955 b/active/CVE-2015-8955 index 7a4f342fe..60b16dc75 100644 --- a/active/CVE-2015-8955 +++ b/active/CVE-2015-8955 @@ -7,5 +7,5 @@ upstream: released (4.1-rc1) [8fff105e13041e49b82f92eef034f363a6b1c071] 3.16-upstream-stable: released (3.16.39) [arm64-perf-reject-groups-spanning-multiple-hw-pmus.patch] 3.2-upstream-stable: N/A "Vulnerable architecture not present" sid: released (4.1.3-1) -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: N/A "Vulnerable architecture not present" diff --git a/active/CVE-2015-8962 b/active/CVE-2015-8962 index 7191796d7..013f4ea8f 100644 --- a/active/CVE-2015-8962 +++ b/active/CVE-2015-8962 @@ -6,5 +6,5 @@ upstream: released (4.4-rc1) [f3951a3709ff50990bf3e188c27d346792103432] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.4.2-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/sg-fix-double-free-when-drives-detach-during-sg_io.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/sg-fix-double-free-when-drives-detach-during-sg_io.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/sg-fix-double-free-when-drives-detach-during-sg_io.patch] diff --git a/active/CVE-2015-8963 b/active/CVE-2015-8963 index 996ad96ef..0d9b88d22 100644 --- a/active/CVE-2015-8963 +++ b/active/CVE-2015-8963 @@ -6,5 +6,5 @@ upstream: released (4.4) [12ca6ad2e3a896256f086497a7c7406a547ee373] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.4.2-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/perf-fix-race-in-swevent-hash.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/perf-fix-race-in-swevent-hash.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/perf-fix-race-in-swevent-hash.patch] diff --git a/active/CVE-2015-8964 b/active/CVE-2015-8964 index dd45ae844..30f0c12d9 100644 --- a/active/CVE-2015-8964 +++ b/active/CVE-2015-8964 @@ -14,5 +14,5 @@ upstream: released (4.5-rc1) [dd42bf1197144ede075a9d4793123f7689e164bc] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.5.1-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/tty-prevent-ldisc-drivers-from-re-using-stale-tty-fi.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/tty-prevent-ldisc-drivers-from-re-using-stale-tty-fi.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/tty-prevent-ldisc-drivers-from-re-using-stale-tty-fi.patch] diff --git a/active/CVE-2016-10088 b/active/CVE-2016-10088 index d23663192..c07da9a38 100644 --- a/active/CVE-2016-10088 +++ b/active/CVE-2016-10088 @@ -10,5 +10,5 @@ upstream: released (4.10-rc1) [128394eff343fc6d2f32172f03e24829539c5835] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.8.15-2) [bugfix/all/sg_write-bsg_write-is-not-fit-to-be-called-under-KER.patch] -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/sg_write-bsg_write-is-not-fit-to-be-called-under-ker.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/sg_write-bsg_write-is-not-fit-to-be-called-under-ker.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/sg_write-bsg_write-is-not-fit-to-be-called-under-ker.patch] diff --git a/active/CVE-2016-5412 b/active/CVE-2016-5412 index 0084ed731..09d03b714 100644 --- a/active/CVE-2016-5412 +++ b/active/CVE-2016-5412 @@ -10,5 +10,5 @@ upstream: released (4.8-rc1) [f024ee098476a3e620232e4a78cfac505f121245, 93d17397 3.16-upstream-stable: released (3.16.37) [kvm-ppc-book3s-hv-pull-out-tm-state-save-restore-into-separate.patch, kvm-ppc-book3s-hv-save-restore-tm-state-in-h_cede.patch] 3.2-upstream-stable: N/A "Transactional memory is not supported" sid: released (4.7.2-1) -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: N/A "Transactional memory is not supported" diff --git a/active/CVE-2016-7097 b/active/CVE-2016-7097 index 205b1444e..37e66c414 100644 --- a/active/CVE-2016-7097 +++ b/active/CVE-2016-7097 @@ -9,5 +9,5 @@ upstream: released (4.9-rc1) [073931017b49d9458aa351605b43a7e34598caef] 3.16-upstream-stable: released (3.16.39) [posix_acl-clear-sgid-bit-when-setting-file-permissions.patch] 3.2-upstream-stable: released (3.2.84) [posix_acl-clear-sgid-bit-when-setting-file-permissions.patch] sid: released (4.7.8-1) [bugfix/all/posix_acl-clear-sgid-bit-when-setting-file-permissio.patch] -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: released (3.2.84-1) diff --git a/active/CVE-2016-7910 b/active/CVE-2016-7910 index 16ca965ed..7bfe7ce89 100644 --- a/active/CVE-2016-7910 +++ b/active/CVE-2016-7910 @@ -6,5 +6,5 @@ upstream: released (4.8-rc1) [77da160530dd1dc94f6ae15a981f24e5f0021e84] 3.16-upstream-stable: released (3.16.39) 3.2-upstream-stable: released (3.2.84) sid: released (4.7.2-1) -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: released (3.2.84-1) diff --git a/active/CVE-2016-7911 b/active/CVE-2016-7911 index ca0457203..008c192be 100644 --- a/active/CVE-2016-7911 +++ b/active/CVE-2016-7911 @@ -7,5 +7,5 @@ upstream: released (4.7-rc7) 8ba8682107ee2ca3347354e018865d8e1967c5f4] 3.16-upstream-stable: released (3.16.37) 3.2-upstream-stable: needed sid: released (4.7.2-1) -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/block-fix-use-after-free-in-sys_ioprio_get.patch] diff --git a/active/CVE-2016-7912 b/active/CVE-2016-7912 index 0722acef4..749915da7 100644 --- a/active/CVE-2016-7912 +++ b/active/CVE-2016-7912 @@ -8,5 +8,5 @@ upstream: released (4.6-rc5) [38740a5b87d53ceb89eb2c970150f6e94e00373a] 3.16-upstream-stable: needed 3.2-upstream-stable: N/A "Vulnerable code not present" sid: released (4.5.3-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/usb-gadget-f_fs-fix-use-after-free.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/usb-gadget-f_fs-fix-use-after-free.patch] 3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2016-7915 b/active/CVE-2016-7915 index 3b997f1c9..aed8cbeb4 100644 --- a/active/CVE-2016-7915 +++ b/active/CVE-2016-7915 @@ -6,5 +6,5 @@ upstream: released (4.6-rc1) [50220dead1650609206efe91f0cc116132d59b3f] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.6.1-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/hid-core-prevent-out-of-bound-readings.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/hid-core-prevent-out-of-bound-readings.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/hid-core-prevent-out-of-bound-readings.patch] diff --git a/active/CVE-2016-7917 b/active/CVE-2016-7917 index 7abe8a588..c3988ca02 100644 --- a/active/CVE-2016-7917 +++ b/active/CVE-2016-7917 @@ -15,5 +15,5 @@ upstream: released (4.5-rc6) [c58d6c93680f28ac58984af61d0a7ebf4319c241] 3.16-upstream-stable: needed 3.2-upstream-stable: N/A "Vulnerable code not present" sid: released (4.5.1-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/netfilter-nfnetlink-correctly-validate-length-of-bat.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/netfilter-nfnetlink-correctly-validate-length-of-bat.patch] 3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2016-8399 b/active/CVE-2016-8399 index c06559d6f..564a19b8b 100644 --- a/active/CVE-2016-8399 +++ b/active/CVE-2016-8399 @@ -9,5 +9,5 @@ upstream: released (4.9) [0eab121ef8750a5c8637d51534d5e9143fb0633f] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.8.15-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/net-ping-check-minimum-size-on-icmp-header-length.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/net-ping-check-minimum-size-on-icmp-header-length.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/net-ping-check-minimum-size-on-icmp-header-length.patch] diff --git a/active/CVE-2016-8633 b/active/CVE-2016-8633 index 0977035cc..4bce5886f 100644 --- a/active/CVE-2016-8633 +++ b/active/CVE-2016-8633 @@ -7,5 +7,5 @@ upstream: released (4.9-rc4) [667121ace9dbafb368618dbabcf07901c962ddac] 3.16-upstream-stable: released (3.16.39) [firewire-net-guard-against-rx-buffer-overflows.patch] 3.2-upstream-stable: released (3.2.84) [firewire-net-guard-against-rx-buffer-overflows.patch] sid: released (4.8.7-1) -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: released (3.2.84-1) diff --git a/active/CVE-2016-8645 b/active/CVE-2016-8645 index 9a066d530..ba940555c 100644 --- a/active/CVE-2016-8645 +++ b/active/CVE-2016-8645 @@ -21,5 +21,5 @@ upstream: released (4.9-rc6) [ac6e780070e30e4c35bd395acfe9191e6268bdd3] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.8.11-1) [2b5f22e4f7fd208c8d392e5c3755cea1f562cb98] -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/tcp-take-care-of-truncations-done-by-sk_filter.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/tcp-take-care-of-truncations-done-by-sk_filter.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/tcp-take-care-of-truncations-done-by-sk_filter.patch] diff --git a/active/CVE-2016-8650 b/active/CVE-2016-8650 index f09822273..28c1aa0a9 100644 --- a/active/CVE-2016-8650 +++ b/active/CVE-2016-8650 @@ -8,5 +8,5 @@ upstream: released (4.9-rc7) [f5527fffff3f002b0a6b376163613b82f69de073] 3.16-upstream-stable: needed 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.3-rc1 with cdec9cb5167ab1113ba9c58e395f664d9d3f9acb" sid: released (4.8.11-1) [bugfix/all/mpi-Fix-NULL-ptr-dereference-in-mpi_powm-ver-3.patch] -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/mpi-fix-null-ptr-dereference-in-mpi_powm-ver-3.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/mpi-fix-null-ptr-dereference-in-mpi_powm-ver-3.patch] 3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2016-8655 b/active/CVE-2016-8655 index 737575993..2a44cf84a 100644 --- a/active/CVE-2016-8655 +++ b/active/CVE-2016-8655 @@ -10,5 +10,5 @@ upstream: released (4.9-rc8) [84ac7260236a49c79eede91617700174c2c19b0c] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.8.15-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/packet-fix-race-condition-in-packet_set_ring.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/packet-fix-race-condition-in-packet_set_ring.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/packet-fix-race-condition-in-packet_set_ring.patch] diff --git a/active/CVE-2016-8658 b/active/CVE-2016-8658 index 4f4d0fc0c..282f10348 100644 --- a/active/CVE-2016-8658 +++ b/active/CVE-2016-8658 @@ -11,5 +11,5 @@ upstream: released (4.8-rc8) [ded89912156b1a47d940a0c954c43afbabd0c42c] 3.16-upstream-stable: released (3.16.39) [brcmfmac-avoid-potential-stack-overflow-in-brcmf_cfg80211_start_ap.patch] 3.2-upstream-stable: N/A "Vulnerable code not present" sid: released (4.7.5-1) -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2016-9083 b/active/CVE-2016-9083 index 13baedd45..433fb4d3e 100644 --- a/active/CVE-2016-9083 +++ b/active/CVE-2016-9083 @@ -7,5 +7,5 @@ upstream: released (4.9-rc4) [05692d7005a364add85c6e25a6c4447ce08f913a] 3.16-upstream-stable: released (3.16.39) [vfio-pci-fix-integer-overflows-bitmask-check.patch] 3.2-upstream-stable: N/A "Vulnerable code not present" sid: released (4.8.11-1) [bugfix/all/vfio-pci-Fix-integer-overflows-bitmask-check.patch] -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2016-9084 b/active/CVE-2016-9084 index aa4a10f8f..958a441dc 100644 --- a/active/CVE-2016-9084 +++ b/active/CVE-2016-9084 @@ -7,5 +7,5 @@ upstream: released (4.9-rc4) [05692d7005a364add85c6e25a6c4447ce08f913a] 3.16-upstream-stable: released (3.16.39) [vfio-pci-fix-integer-overflows-bitmask-check.patch] 3.2-upstream-stable: N/A "Vulnerable code not present" sid: released (4.8.11-1) [bugfix/all/vfio-pci-Fix-integer-overflows-bitmask-check.patch] -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2016-9178 b/active/CVE-2016-9178 index 50b773247..562a0f63c 100644 --- a/active/CVE-2016-9178 +++ b/active/CVE-2016-9178 @@ -13,5 +13,5 @@ upstream: released (4.8-rc7) [1c109fabbd51863475cd12ac206bdd249aee35af] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.7.5-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/x86/fix-potential-infoleak-in-older-kernels.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/x86/fix-potential-infoleak-in-older-kernels.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/x86/fix-potential-infoleak-in-older-kernels.patch] diff --git a/active/CVE-2016-9555 b/active/CVE-2016-9555 index 37627fbd7..a388a446b 100644 --- a/active/CVE-2016-9555 +++ b/active/CVE-2016-9555 @@ -6,5 +6,5 @@ upstream: released (4.9-rc4) [bf911e985d6bbaa328c20c3e05f4eb03de11fdd6] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.8.11-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/sctp-validate-chunk-len-before-actually-using-it.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/sctp-validate-chunk-len-before-actually-using-it.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/sctp-validate-chunk-len-before-actually-using-it.patch] diff --git a/active/CVE-2016-9576 b/active/CVE-2016-9576 index 539d0e9be..38e0656ae 100644 --- a/active/CVE-2016-9576 +++ b/active/CVE-2016-9576 @@ -14,5 +14,5 @@ upstream: released (4.9) [a0ac402cfcdc904f9772e1762b3fda112dcc56a0] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.8.15-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/sg_write-bsg_write-is-not-fit-to-be-called-under-ker.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/sg_write-bsg_write-is-not-fit-to-be-called-under-ker.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/sg_write-bsg_write-is-not-fit-to-be-called-under-ker.patch] diff --git a/active/CVE-2016-9754 b/active/CVE-2016-9754 index 2542ca6a9..ce16fa2d5 100644 --- a/active/CVE-2016-9754 +++ b/active/CVE-2016-9754 @@ -6,5 +6,5 @@ upstream: released (4.7-rc1) [59643d1535eb220668692a5359de22545af579f6] 3.16-upstream-stable: released (3.16.37) [e5e2cbc7f25c06266bba5072adab68cc64f71401] 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.5-rc1 with 83f40318dab00e3298a1f6d0b12ac025e84e478d sid: released (4.6.1-1) -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2016-9756 b/active/CVE-2016-9756 index 8b51bf418..d58c8edba 100644 --- a/active/CVE-2016-9756 +++ b/active/CVE-2016-9756 @@ -7,5 +7,5 @@ upstream: released (4.9-rc7) [2117d5398c81554fbf803f5fd1dc55eb78216c0c] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.8.15-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/x86/kvm-x86-drop-error-recovery-in-em_jmp_far-and-em_ret.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/x86/kvm-x86-drop-error-recovery-in-em_jmp_far-and-em_ret.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/x86/kvm-x86-drop-error-recovery-in-em_jmp_far-and-em_ret.patch] diff --git a/active/CVE-2016-9793 b/active/CVE-2016-9793 index 0d916b82f..cd63afd44 100644 --- a/active/CVE-2016-9793 +++ b/active/CVE-2016-9793 @@ -9,5 +9,5 @@ upstream: released (4.9-rc8) [b98b0bc8c431e3ceb4b26b0dfc8db509518fb290] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.8.15-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/net-avoid-signed-overflows-for-so_-snd-rcv-bufforce.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/net-avoid-signed-overflows-for-so_-snd-rcv-bufforce.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/net-avoid-signed-overflows-for-so_-snd-rcv-bufforce.patch] diff --git a/active/CVE-2016-9794 b/active/CVE-2016-9794 index cb22060cf..bc3f08cd9 100644 --- a/active/CVE-2016-9794 +++ b/active/CVE-2016-9794 @@ -6,5 +6,5 @@ upstream: released (4.7-rc1) [3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4] 3.16-upstream-stable: needed 3.2-upstream-stable: needed sid: released (4.7.2-1) -3.16-jessie-security: pending (3.16.39-1) [bugfix/all/alsa-pcm-call-kill_fasync-in-stream-lock.patch] +3.16-jessie-security: released (3.16.39-1) [bugfix/all/alsa-pcm-call-kill_fasync-in-stream-lock.patch] 3.2-wheezy-security: released (3.2.84-1) [bugfix/all/alsa-pcm-call-kill_fasync-in-stream-lock.patch] diff --git a/active/CVE-2016-9806 b/active/CVE-2016-9806 index 7756c446c..cea1dd4e6 100644 --- a/active/CVE-2016-9806 +++ b/active/CVE-2016-9806 @@ -8,5 +8,5 @@ upstream: released (4.7-rc1) [92964c79b357efd980812c4de5c1fd2ec8bb5520] 3.16-upstream-stable: released (3.16.37) 3.2-upstream-stable: N/A "Vulnerable code not present" sid: released (4.6.3-1) -3.16-jessie-security: pending (3.16.39-1) +3.16-jessie-security: released (3.16.39-1) 3.2-wheezy-security: N/A "Vulnerable code not present" |