[kernel-sec-discuss] r4759 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Fri Dec 2 07:06:38 UTC 2016


Author: carnil
Date: 2016-12-02 07:06:38 +0000 (Fri, 02 Dec 2016)
New Revision: 4759

Modified:
   active/CVE-2015-1350
   active/CVE-2016-6213
   active/CVE-2016-8645
   active/CVE-2016-8650
   active/CVE-2016-9083
   active/CVE-2016-9084
   active/CVE-2016-9555
Log:
Mark 4.8.11-1 as released

Modified: active/CVE-2015-1350
===================================================================
--- active/CVE-2015-1350	2016-12-01 20:37:46 UTC (rev 4758)
+++ active/CVE-2015-1350	2016-12-02 07:06:38 UTC (rev 4759)
@@ -9,7 +9,7 @@
  carnil> fixes backportable to older versions without breakage?
 Bugs: 770492
 upstream: released (4.9-rc1) [030b533c4fd4d2ec3402363323de4bb2983c9cee]
-sid: pending (4.8.11-1) [bugfix/all/xfs-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/ceph-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fuse-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fs-Give-dentry-to-inode_change_ok-instead-of-inode.patch, bugfix/all/fs-Avoid-premature-clearing-of-capabilities.patch]
+sid: released (4.8.11-1) [bugfix/all/xfs-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/ceph-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fuse-Propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fs-Give-dentry-to-inode_change_ok-instead-of-inode.patch, bugfix/all/fs-Avoid-premature-clearing-of-capabilities.patch]
 3.16-jessie-security: pending (3.16.36-1+deb8u3) [bugfix/all/xfs-propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fuse-propagate-dentry-down-to-inode_change_ok.patch, bugfix/all/fs-give-dentry-to-inode_change_ok-instead-of-inode.patch, bugfix/all/fs-avoid-premature-clearing-of-capabilities.patch]
 3.2-wheezy-security: pending (3.2.84-1)
 3.16-upstream-stable: released (3.16.39) [fs-give-dentry-to-inode_change_ok-instead-of-inode.patch, fs-avoid-premature-clearing-of-capabilities.patch]

Modified: active/CVE-2016-6213
===================================================================
--- active/CVE-2016-6213	2016-12-01 20:37:46 UTC (rev 4758)
+++ active/CVE-2016-6213	2016-12-02 07:06:38 UTC (rev 4759)
@@ -9,6 +9,6 @@
 upstream: released (4.9-rc1) [d29216842a85c7970c536108e093963f02714498]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Unprivileged users cannot manipulate mounts"
-sid: pending (4.8.11-1) [bugfix/all/mnt-Add-a-per-mount-namespace-limit-on-the-number-of.patch]
+sid: released (4.8.11-1) [bugfix/all/mnt-Add-a-per-mount-namespace-limit-on-the-number-of.patch]
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Unprivileged users cannot manipulate mounts"

Modified: active/CVE-2016-8645
===================================================================
--- active/CVE-2016-8645	2016-12-01 20:37:46 UTC (rev 4758)
+++ active/CVE-2016-8645	2016-12-02 07:06:38 UTC (rev 4759)
@@ -18,6 +18,6 @@
 upstream: released (4.9-rc6) [ac6e780070e30e4c35bd395acfe9191e6268bdd3]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerability introduced in 3.6-rc1 with cf60af03ca4e71134206809ea892e49b92a88896"
-sid: pending (4.8.11-1) [2b5f22e4f7fd208c8d392e5c3755cea1f562cb98]
+sid: released (4.8.11-1) [2b5f22e4f7fd208c8d392e5c3755cea1f562cb98]
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2016-8650
===================================================================
--- active/CVE-2016-8650	2016-12-01 20:37:46 UTC (rev 4758)
+++ active/CVE-2016-8650	2016-12-02 07:06:38 UTC (rev 4759)
@@ -7,6 +7,6 @@
 upstream: released (4.9-rc7) [f5527fffff3f002b0a6b376163613b82f69de073]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.3-rc1 with cdec9cb5167ab1113ba9c58e395f664d9d3f9acb"
-sid: pending (4.8.11-1) [bugfix/all/mpi-Fix-NULL-ptr-dereference-in-mpi_powm-ver-3.patch]
+sid: released (4.8.11-1) [bugfix/all/mpi-Fix-NULL-ptr-dereference-in-mpi_powm-ver-3.patch]
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2016-9083
===================================================================
--- active/CVE-2016-9083	2016-12-01 20:37:46 UTC (rev 4758)
+++ active/CVE-2016-9083	2016-12-02 07:06:38 UTC (rev 4759)
@@ -6,6 +6,6 @@
 upstream: released (4.9-rc4) [05692d7005a364add85c6e25a6c4447ce08f913a]
 3.16-upstream-stable: released (3.16.39) [vfio-pci-fix-integer-overflows-bitmask-check.patch]
 3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.8.11-1) [bugfix/all/vfio-pci-Fix-integer-overflows-bitmask-check.patch]
+sid: released (4.8.11-1) [bugfix/all/vfio-pci-Fix-integer-overflows-bitmask-check.patch]
 3.16-jessie-security: pending (3.16.36-1+deb8u3) [bugfix/all/vfio-pci-fix-integer-overflows-bitmask-check.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2016-9084
===================================================================
--- active/CVE-2016-9084	2016-12-01 20:37:46 UTC (rev 4758)
+++ active/CVE-2016-9084	2016-12-02 07:06:38 UTC (rev 4759)
@@ -6,6 +6,6 @@
 upstream: released (4.9-rc4) [05692d7005a364add85c6e25a6c4447ce08f913a]
 3.16-upstream-stable: released (3.16.39) [vfio-pci-fix-integer-overflows-bitmask-check.patch]
 3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.8.11-1) [bugfix/all/vfio-pci-Fix-integer-overflows-bitmask-check.patch]
+sid: released (4.8.11-1) [bugfix/all/vfio-pci-Fix-integer-overflows-bitmask-check.patch]
 3.16-jessie-security: pending (3.16.36-1+deb8u3) [bugfix/all/vfio-pci-fix-integer-overflows-bitmask-check.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2016-9555
===================================================================
--- active/CVE-2016-9555	2016-12-01 20:37:46 UTC (rev 4758)
+++ active/CVE-2016-9555	2016-12-02 07:06:38 UTC (rev 4759)
@@ -5,6 +5,6 @@
 upstream: released (4.9-rc4) [bf911e985d6bbaa328c20c3e05f4eb03de11fdd6]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.8.11-1)
+sid: released (4.8.11-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: needed




More information about the kernel-sec-discuss mailing list