[Git][security-tracker-team/security-tracker][master] Sync status on linux CVEs

Salvatore Bonaccorso carnil at debian.org
Sat May 26 09:53:49 BST 2018


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
cc5269f1 by Salvatore Bonaccorso at 2018-05-26T10:53:09+02:00
Sync status on linux CVEs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -2830,6 +2830,7 @@ CVE-2018-10324
 CVE-2018-10323 (The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in ...)
 	{DSA-4188-1}
 	- linux 4.16.5-1
+	[wheezy] - linux <ignored> (Too much work to backport)
 	NOTE: https://bugzilla.kernel.org/show_bug.cgi?id=199423
 CVE-2018-10322 (The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the ...)
 	- linux 4.16.5-1
@@ -10875,6 +10876,7 @@ CVE-2018-7274 (Yab Quarx through 2.4.3 is prone to multiple persistent cross-sit
 	NOT-FOR-US: Yab Quarx
 CVE-2018-7273 (In the Linux kernel through 4.15.4, the floppy driver reveals the ...)
 	- linux 4.15.4-1
+	[wheezy] - linux <ignored> (Minor issue)
 	NOTE: https://lkml.org/lkml/2018/2/20/669
 CVE-2018-7272 (The REST APIs in ForgeRock AM before 5.5.0 include SSOToken IDs as part ...)
 	NOT-FOR-US: ForgeRock AM
@@ -21035,6 +21037,7 @@ CVE-2018-3639 (Systems with microprocessors utilizing speculative execution and 
 	- intel-microcode <unfixed>
 	- amd64-microcode <unfixed>
 	- linux <unfixed>
+	[wheezy] - linux <ignored> (Too much work to backport)
 	- xen <unfixed>
 	NOTE: https://xenbits.xen.org/xsa/advisory-263.html
 	NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
@@ -37567,6 +37570,7 @@ CVE-2017-15122
 	RESERVED
 CVE-2017-15121 (A non-privileged user is able to mount a fuse filesystem on RHEL 6 or ...)
 	- linux 3.11.5-1
+	[wheezy] - linux <ignored> (Too much work to backport)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1520893
 	NOTE: Fixed by: https://git.kernel.org/linus/5a7203947a1d9b6f3a00a39fda08c2466489555f (v3.11-rc1)
 CVE-2017-15120 [Crafted CNAME answer can cause a denial of service]
@@ -101727,6 +101731,7 @@ CVE-2016-3662
 	RESERVED
 CVE-2015-8839 (Multiple race conditions in the ext4 filesystem implementation in the ...)
 	- linux 4.5.1-1
+	[wheezy] - linux <ignored> (Too much work to backport)
 	NOTE: https://git.kernel.org/linus/ea3d7209ca01da209cda6f0dea8be9cc4b7a933b (v4.5-rc1)
 	NOTE: https://git.kernel.org/linus/17048e8a083fec7ad841d88ef0812707fbc7e39f (v4.5-rc1)
 	NOTE: https://git.kernel.org/linus/32ebffd3bbb4162da5ff88f9a35dd32d0a28ea70 (v4.5-rc1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/cc5269f158cc3f72ccf08f48516205355e85ac12

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/cc5269f158cc3f72ccf08f48516205355e85ac12
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20180526/35228aa5/attachment.html>


More information about the debian-security-tracker-commits mailing list