[kernel-sec-discuss] r4340 - active

Ben Hutchings benh at moszumanska.debian.org
Sat Apr 30 18:20:37 UTC 2016


Author: benh
Date: 2016-04-30 18:20:37 +0000 (Sat, 30 Apr 2016)
New Revision: 4340

Modified:
   active/CVE-2016-3134
   active/CVE-2016-3156
   active/CVE-2016-3672
   active/CVE-2016-3951
Log:
Mark issues pending in {wheezy,jessie}-security

Modified: active/CVE-2016-3134
===================================================================
--- active/CVE-2016-3134	2016-04-29 14:24:20 UTC (rev 4339)
+++ active/CVE-2016-3134	2016-04-30 18:20:37 UTC (rev 4340)
@@ -15,5 +15,5 @@
 3.16-upstream-stable: pending (3.16.35) [netfilter-x_tables-validate-e-target_offset-early.patch, netfilter-x_tables-make-sure-e-next_offset-covers-remaining-blob.patch]
 3.2-upstream-stable: pending (3.2.80) [netfilter-x_tables-validate-e-target_offset-early.patch, netfilter-x_tables-make-sure-e-next_offset-covers-remaining-blob.patch]
 sid: released (4.5.1-1) [bugfix/all/netfilter-x_tables-validate-e-target_offset-early.patch, bugfix/all/netfilter-x_tables-make-sure-e-next_offset-covers-re.patch]
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/netfilter-x_tables-validate-e-target_offset-early.patch, bugfix/all/netfilter-x_tables-make-sure-e-next_offset-covers-remaining-blob.patch]
 3.2-wheezy-security: needed

Modified: active/CVE-2016-3156
===================================================================
--- active/CVE-2016-3156	2016-04-29 14:24:20 UTC (rev 4339)
+++ active/CVE-2016-3156	2016-04-30 18:20:37 UTC (rev 4340)
@@ -6,5 +6,5 @@
 3.16-upstream-stable: released (3.16.7-ckt27)
 3.2-upstream-stable: pending (3.2.80) [ipv4-don-t-do-expensive-useless-work-during-inetdev-destroy.patch]
 sid: released (4.5.1-1) [bugfix/all/ipv4-don-t-do-expensive-useless-work-during-inetdev-.patch]
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/ipv4-don-t-do-expensive-useless-work-during-inetdev-.patch]
 3.2-wheezy-security: needed

Modified: active/CVE-2016-3672
===================================================================
--- active/CVE-2016-3672	2016-04-29 14:24:20 UTC (rev 4339)
+++ active/CVE-2016-3672	2016-04-30 18:20:37 UTC (rev 4340)
@@ -7,8 +7,8 @@
  bwh> probably wait a while before backporting.
 Bugs:
 upstream: released (4.6-rc1) [8b8addf891de8a00e4d39fc32f93f7c5eb8feceb]
-3.16-upstream-stable: pending (3.16.35) [x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
-3.2-upstream-stable: pending (3.2.80) [x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
+3.16-upstream-stable: pending (3.16.35) [x86-standardize-mmap_rnd-usage.patch, x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
+3.2-upstream-stable: pending (3.2.80) [x86-standardize-mmap_rnd-usage.patch, x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
 sid: released (4.5.1-1) [bugfix/all/x86-mm-32-enable-full-randomization-on-i386-and-x86_.patch]
-3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/x86/x86-standardize-mmap_rnd-usage.patch, bugfix/x86/x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
+3.2-wheezy-security: pending (3.2.78-1+deb7u1) [bugfix/x86/x86-standardize-mmap_rnd-usage.patch, bugfix/x86/x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]

Modified: active/CVE-2016-3951
===================================================================
--- active/CVE-2016-3951	2016-04-29 14:24:20 UTC (rev 4339)
+++ active/CVE-2016-3951	2016-04-30 18:20:37 UTC (rev 4340)
@@ -7,5 +7,5 @@
 3.16-upstream-stable: pending (3.16.35) [usbnet-cleanup-after-bind-in-probe.patch]
 3.2-upstream-stable: pending (3.2.80) [usbnet-cleanup-after-bind-in-probe.patch]
 sid: released (4.5.1-1)
-3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/cdc_ncm-do-not-call-usbnet_link_change-from-cdc_ncm_.patch, bugfix/all/usbnet-cleanup-after-bind-in-probe.patch]
+3.2-wheezy-security: pending (3.2.78-1+deb7u1) [bugfix/all/usbnet-cleanup-after-bind-in-probe.patch]




More information about the kernel-sec-discuss mailing list