[kernel-sec-discuss] r4575 - active

Ben Hutchings benh at moszumanska.debian.org
Fri Aug 12 13:10:24 UTC 2016


Author: benh
Date: 2016-08-12 13:10:24 +0000 (Fri, 12 Aug 2016)
New Revision: 4575

Modified:
   active/CVE-2016-4997
   active/CVE-2016-4998
Log:
Mark CVE-2016-499{7,8} pending for 3.16-upstream-stable

Modified: active/CVE-2016-4997
===================================================================
--- active/CVE-2016-4997	2016-08-12 04:55:37 UTC (rev 4574)
+++ active/CVE-2016-4997	2016-08-12 13:10:24 UTC (rev 4575)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (4.7-rc1) [fc1221b3a163d1386d1052184202d5dc50d302d1, ce683e5f9d045e5d67d1312a42b359cb2ab2a13c]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.37) [netfilter-x_tables-add-compat-version-of-xt_check_entry_offsets.patch, netfilter-x_tables-check-for-bogus-target-offset.patch]
 3.2-upstream-stable: ignored "too many changes required, and netfilter is not exposed to unprivileged users"
 sid: released (4.6.2-2) [bugfix/all/netfilter-x_tables-add-compat-version-of-xt_check_en.patch, bugfix/all/netfilter-x_tables-check-for-bogus-target-offset.patch]
 3.16-jessie-security: released (3.16.7-ckt25-2+deb8u1) [bugfix/all/netfilter-x_tables-add-compat-version-of-xt_check_en.patch, bugfix/all/netfilter-x_tables-check-for-bogus-target-offset.patch]

Modified: active/CVE-2016-4998
===================================================================
--- active/CVE-2016-4998	2016-08-12 04:55:37 UTC (rev 4574)
+++ active/CVE-2016-4998	2016-08-12 13:10:24 UTC (rev 4575)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (4.7-rc1) [7d35812c3214afa5b37a675113555259cfd67b98, a08e4e190b866579896c09af59b3bdca821da2cd, 7ed2abddd20cf8f6bd27f65bd218f26fa5bf7f44, 13631bfc604161a9d69cd68991dff8603edd66f9, b7eba0f3515fca3296b8881d583f7c1042f5226]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.37) [netfilter-x_tables-add-and-use-xt_check_entry_offsets.patch, netfilter-x_tables-assert-minimum-target-size.patch, netfilter-x_tables-check-standard-target-size-too.patch, netfilter-x_tables-validate-all-offsets-and-sizes-in-a-rule.patch, netfilter-x_tables-don-t-reject-valid-target-size-on-some.patch]
 3.2-upstream-stable: ignored "too many changes required, and netfilter is not exposed to unprivileged users"
 sid: released (4.6.2-2) [bugfix/all/netfilter-x_tables-add-and-use-xt_check_entry_offset.patch, bugfix/all/netfilter-x_tables-assert-minimum-target-size.patch, bugfix/all/netfilter-x_tables-check-standard-target-size-too.patch, bugfix/all/netfilter-x_tables-validate-all-offsets-and-sizes-in.patch, bugfix/all/netfilter-x_tables-don-t-reject-valid-target-size-on.patch]
 3.16-jessie-security: released (3.16.7-ckt25-2+deb8u1) [bugfix/all/netfilter-x_tables-add-and-use-xt_check_entry_offset.patch, bugfix/all/netfilter-x_tables-assert-minimum-target-size.patch, bugfix/all/netfilter-x_tables-check-standard-target-size-too.patch, bugfix/all/netfilter-x_tables-validate-all-offsets-and-sizes-in.patch, bugfix/all/netfilter-x_tables-don-t-reject-valid-target-size-on.patch]




More information about the kernel-sec-discuss mailing list