[kernel-sec-discuss] r4175 - active

Ben Hutchings benh at moszumanska.debian.org
Tue Feb 23 02:48:54 UTC 2016


Author: benh
Date: 2016-02-23 02:48:53 +0000 (Tue, 23 Feb 2016)
New Revision: 4175

Modified:
   active/CVE-2013-4312
   active/CVE-2015-7566
   active/CVE-2015-8812
   active/CVE-2016-0723
   active/CVE-2016-0774
   active/CVE-2016-2384
Log:
Mark issues pending for 3.2.78

Modified: active/CVE-2013-4312
===================================================================
--- active/CVE-2013-4312	2016-02-22 21:29:31 UTC (rev 4174)
+++ active/CVE-2013-4312	2016-02-23 02:48:53 UTC (rev 4175)
@@ -13,7 +13,7 @@
  https://bugzilla.kernel.org/show_bug.cgi?id=20402
 upstream: released (4.5-rc1) [712f4aad406bb1ed67f3f98d04c044191f0ff593, 759c01142a5d0f364a462346168a56de28a80f52]
 3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.78) [unix-properly-account-for-fds-passed-over-unix-sockets.patch, pipe-limit-the-per-user-amount-of-pages-allocated-in.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.3.5-1) [bugfix/all/pipe-limit-the-per-user-amount-of-pages-allocated-in.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u4) [bugfix/all/unix-properly-account-for-FDs-passed-over-unix-socke.patch, bugfix/all/pipe-limit-the-per-user-amount-of-pages-allocated-in.patch]

Modified: active/CVE-2015-7566
===================================================================
--- active/CVE-2015-7566	2016-02-22 21:29:31 UTC (rev 4174)
+++ active/CVE-2015-7566	2016-02-23 02:48:53 UTC (rev 4175)
@@ -7,7 +7,7 @@
 Bugs:
 upstream: released (4.5-rc2) [cb3232138e37129e88240a98a1d2aba2187ff57c]
 3.16-upstream-stable: pending (3.16.7-ckt25)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.78) [usb-serial-visor-fix-crash-on-detecting-device-without-write_urbs.patch]
 2.6.32-upstream-stable: pending (2.6.32.71)
 sid: released (4.3.3-6) [bugfix/all/usb-serial-visor-fix-crash-on-detecting-device-without-write_urbs.patch]
 3.16-jessie-security: released (3.16.7-ckt20-1+deb8u3) [bugfix/all/usb-serial-visor-fix-crash-on-detecting-device-without-write_urbs.patch]

Modified: active/CVE-2015-8812
===================================================================
--- active/CVE-2015-8812	2016-02-22 21:29:31 UTC (rev 4174)
+++ active/CVE-2015-8812	2016-02-23 02:48:53 UTC (rev 4175)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (v4.5-rc1) [67f1aee6f45059fd6b0f5b0ecb2c97ad0451f6b3]
 3.16-upstream-stable: pending (3.16.7-ckt25)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.78) [iw_cxgb3-fix-incorrectly-returning-error-on-success.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.4.2-1) [bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u4) [bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]

Modified: active/CVE-2016-0723
===================================================================
--- active/CVE-2016-0723	2016-02-22 21:29:31 UTC (rev 4174)
+++ active/CVE-2016-0723	2016-02-23 02:48:53 UTC (rev 4175)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (4.5-rc2) [5c17c861a357e9458001f021a7afa7aab9937439]
 3.16-upstream-stable: pending (3.16.7-ckt25)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.78) [tty-fix-unsafe-ldisc-reference-via-ioctl-tiocgetd.patch]
 2.6.32-upstream-stable: pending (2.6.32.71)
 sid: released (4.3.3-6) [bugfix/all/tty-fix-unsafe-ldisc-reference-via-ioctl-tiocgetd.patch]
 3.16-jessie-security: released (3.16.7-ckt20-1+deb8u3) [bugfix/all/tty-fix-unsafe-ldisc-reference-via-ioctl-tiocgetd.patch]

Modified: active/CVE-2016-0774
===================================================================
--- active/CVE-2016-0774	2016-02-22 21:29:31 UTC (rev 4174)
+++ active/CVE-2016-0774	2016-02-23 02:48:53 UTC (rev 4175)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: N/A "upstream fix was correct"
 3.16-upstream-stable: N/A "upstream fix was correct"
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.78) [pipe-fix-buffer-offset-after-partially-failed-read.patch]
 2.6.32-upstream-stable: needed
 sid: N/A "upstream fix was correct"
 3.16-jessie-security: N/A "upstream fix was correct"

Modified: active/CVE-2016-2384
===================================================================
--- active/CVE-2016-2384	2016-02-22 21:29:31 UTC (rev 4174)
+++ active/CVE-2016-2384	2016-02-23 02:48:53 UTC (rev 4175)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (4.5-rc4) [07d86ca93db7e5cdf4743564d98292042ec21af7]
 3.16-upstream-stable: pending (3.16.7-ckt25)
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending (3.2.78) [alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.4.2-1) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
 3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u4) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]




More information about the kernel-sec-discuss mailing list