[kernel-sec-discuss] r4603 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sun Aug 28 17:55:46 UTC 2016


Author: carnil
Date: 2016-08-28 17:55:45 +0000 (Sun, 28 Aug 2016)
New Revision: 4603

Modified:
   active/CVE-2016-3857
   active/CVE-2016-5400
   active/CVE-2016-5412
   active/CVE-2016-5696
   active/CVE-2016-6136
   active/CVE-2016-6156
   active/CVE-2016-6480
   active/CVE-2016-6516
   active/CVE-2016-6828
Log:
Mark 4.7.2-1 as released (since alread tagged in git)

Modified: active/CVE-2016-3857
===================================================================
--- active/CVE-2016-3857	2016-08-27 22:27:21 UTC (rev 4602)
+++ active/CVE-2016-3857	2016-08-28 17:55:45 UTC (rev 4603)
@@ -6,6 +6,6 @@
 upstream: released (4.8-rc2) [7de249964f5578e67b99699c5f0b405738d820a2]
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.7.2-1)
+sid: released (4.7.2-1)
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2016-5400
===================================================================
--- active/CVE-2016-5400	2016-08-27 22:27:21 UTC (rev 4602)
+++ active/CVE-2016-5400	2016-08-28 17:55:45 UTC (rev 4603)
@@ -6,6 +6,6 @@
 upstream: released (4.7) [aa93d1fee85c890a34f2510a310e55ee76a27848]
 3.16-upstream-stable: N/A "Vulnerable code not present"
 3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.7.2-1)
+sid: released (4.7.2-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2016-5412
===================================================================
--- active/CVE-2016-5412	2016-08-27 22:27:21 UTC (rev 4602)
+++ active/CVE-2016-5412	2016-08-28 17:55:45 UTC (rev 4603)
@@ -9,6 +9,6 @@
 upstream: released (4.8-rc1) [f024ee098476a3e620232e4a78cfac505f121245, 93d17397e4e2182fdaad503e2f9da46202c0f1c3]
 3.16-upstream-stable: released (3.16.37) [kvm-ppc-book3s-hv-pull-out-tm-state-save-restore-into-separate.patch, kvm-ppc-book3s-hv-save-restore-tm-state-in-h_cede.patch]
 3.2-upstream-stable: N/A "Transactional memory is not supported"
-sid: pending (4.7.2-1)
+sid: released (4.7.2-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Transactional memory is not supported"

Modified: active/CVE-2016-5696
===================================================================
--- active/CVE-2016-5696	2016-08-27 22:27:21 UTC (rev 4602)
+++ active/CVE-2016-5696	2016-08-28 17:55:45 UTC (rev 4603)
@@ -13,6 +13,6 @@
 upstream: released (4.7) [75ff39ccc1bd5d3c455b6822ab09e533c551f758]
 3.16-upstream-stable: released (3.16.37) [tcp-make-challenge-acks-less-predictable.patch]
 3.2-upstream-stable: released (3.2.82) [tcp-make-challenge-acks-less-predictable.patch]
-sid: pending (4.7.2-1)
+sid: released (4.7.2-1)
 3.16-jessie-security: pending (3.16.36-1+deb8u1) [bugfix/all/tcp-make-challenge-acks-less-predictable.patch]
 3.2-wheezy-security: pending (3.2.81-2) [bugfix/all/tcp-make-challenge-acks-less-predictable.patch]

Modified: active/CVE-2016-6136
===================================================================
--- active/CVE-2016-6136	2016-08-27 22:27:21 UTC (rev 4602)
+++ active/CVE-2016-6136	2016-08-28 17:55:45 UTC (rev 4603)
@@ -8,6 +8,6 @@
 upstream: released (4.8-rc1) [43761473c254b45883a64441dd0bc85a42f3645c]
 3.16-upstream-stable: released (3.16.37) [audit-fix-a-double-fetch-in-audit_log_single_execve_arg.patch]
 3.2-upstream-stable: released (3.2.82) [audit-fix-a-double-fetch-in-audit_log_single_execve_arg.patch]
-sid: pending (4.7.2-1)
+sid: released (4.7.2-1)
 3.16-jessie-security: pending (3.16.36-1+deb8u1) [bugfix/all/audit-fix-a-double-fetch-in-audit_log_single_execve_arg.patch]
 3.2-wheezy-security: pending (3.2.81-2) [bugfix/all/audit-fix-a-double-fetch-in-audit_log_single_execve_arg.patch]

Modified: active/CVE-2016-6156
===================================================================
--- active/CVE-2016-6156	2016-08-27 22:27:21 UTC (rev 4602)
+++ active/CVE-2016-6156	2016-08-28 17:55:45 UTC (rev 4603)
@@ -9,6 +9,6 @@
 upstream: released (4.7-rc7) [096cdc6f52225835ff503f987a0d68ef770bb78e]
 3.16-upstream-stable: N/A "Introduced in 4.2-rc1 with a841178445bb72a3d566b4e6ab9d19e9b002eb47"
 3.2-upstream-stable: N/A "Introduced in 4.2-rc1 with a841178445bb72a3d566b4e6ab9d19e9b002eb47"
-sid: pending (4.7.2-1)
+sid: released (4.7.2-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2016-6480
===================================================================
--- active/CVE-2016-6480	2016-08-27 22:27:21 UTC (rev 4602)
+++ active/CVE-2016-6480	2016-08-28 17:55:45 UTC (rev 4603)
@@ -8,6 +8,6 @@
 upstream: released (4.8-rc3) [fa00c437eef8dc2e7b25f8cd868cfa405fcc2bb3]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.7.2-1) [bugfix/all/aacraid-check-size-values-after-double-fetch-from-us.patch]
+sid: released (4.7.2-1) [bugfix/all/aacraid-check-size-values-after-double-fetch-from-us.patch]
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2016-6516
===================================================================
--- active/CVE-2016-6516	2016-08-27 22:27:21 UTC (rev 4602)
+++ active/CVE-2016-6516	2016-08-28 17:55:45 UTC (rev 4603)
@@ -5,6 +5,6 @@
 upstream: released (4.8-rc1) [10eec60ce79187686e052092e5383c99b4420a20]
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.5-rc1 with 54dbc15172375641ef03399e8f911d7165eb90fb"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.5-rc1 with 54dbc15172375641ef03399e8f911d7165eb90fb"
-sid: pending (4.7.2-1)
+sid: released (4.7.2-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2016-6828
===================================================================
--- active/CVE-2016-6828	2016-08-27 22:27:21 UTC (rev 4602)
+++ active/CVE-2016-6828	2016-08-28 17:55:45 UTC (rev 4603)
@@ -8,6 +8,6 @@
 upstream: needed
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.7.2-1) [bugfix/all/tcp-fix-use-after-free-in-tcp_xmit_retransmit_queue.patch]
+sid: released (4.7.2-1) [bugfix/all/tcp-fix-use-after-free-in-tcp_xmit_retransmit_queue.patch]
 3.16-jessie-security: needed
 3.2-wheezy-security: needed




More information about the kernel-sec-discuss mailing list