[kernel-sec-discuss] r4080 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Tue Jan 5 13:50:15 UTC 2016


Author: jmm
Date: 2016-01-05 13:50:14 +0000 (Tue, 05 Jan 2016)
New Revision: 4080

Modified:
   active/CVE-2015-7513
   active/CVE-2015-7550
   active/CVE-2015-8543
   active/CVE-2015-8569
   active/CVE-2015-8575
Log:
pending fixes for 3.16.x


Modified: active/CVE-2015-7513
===================================================================
--- active/CVE-2015-7513	2016-01-04 01:57:47 UTC (rev 4079)
+++ active/CVE-2015-7513	2016-01-05 13:50:14 UTC (rev 4080)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (v4.4-rc7) [0185604c2d82c560dab2f2933a18f797e74ab5a8]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.7-ckt22)
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
 sid: released (4.3.3-3) [bugfix/x86/KVM-x86-Reload-pit-counters-for-all-channels-when-re.patch]

Modified: active/CVE-2015-7550
===================================================================
--- active/CVE-2015-7550	2016-01-04 01:57:47 UTC (rev 4079)
+++ active/CVE-2015-7550	2016-01-05 13:50:14 UTC (rev 4080)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (4.4-rc8) [b4a1b4f5047e4f54e194681125c74c0aa64d637d]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.7-ckt22)
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed
 sid: released (4.3.3-3) [bugfix/all/keys-fix-race-between-read-and-revoke.patch]

Modified: active/CVE-2015-8543
===================================================================
--- active/CVE-2015-8543	2016-01-04 01:57:47 UTC (rev 4079)
+++ active/CVE-2015-8543	2016-01-05 13:50:14 UTC (rev 4080)
@@ -8,7 +8,7 @@
  bwh> For earlier versions it's not important.
 Bugs:
 upstream: released (4.4-rc6) [79462ad02e861803b3840cc782248c7359451cd9]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.7-ckt22)
 3.2-upstream-stable: released (3.2.75) [net-add-validation-for-the-socket-syscall-protocol-argument.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.3.3-1) [bugfix/all/net-add-validation-for-the-socket-syscall-protocol.patch]

Modified: active/CVE-2015-8569
===================================================================
--- active/CVE-2015-8569	2016-01-04 01:57:47 UTC (rev 4079)
+++ active/CVE-2015-8569	2016-01-05 13:50:14 UTC (rev 4080)
@@ -5,7 +5,7 @@
 Notes:
 Bugs:
 upstream: released (4.4-rc6) [09ccfd238e5a0e670d8178cf50180ea81ae09ae1]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.7-ckt22)
 3.2-upstream-stable: released (3.2.75) [pptp-verify-sockaddr_len-in-pptp_bind-and-pptp_connect.patch]
 2.6.32-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.3.3-3) [bugfix/all/pptp-verify-sockaddr_len-in-pptp_bind-and-pptp_conne.patch]

Modified: active/CVE-2015-8575
===================================================================
--- active/CVE-2015-8575	2016-01-04 01:57:47 UTC (rev 4079)
+++ active/CVE-2015-8575	2016-01-05 13:50:14 UTC (rev 4080)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (4.4-rc6) [5233252fce714053f0151680933571a2da9cbfb4]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.7-ckt22)
 3.2-upstream-stable: released (3.2.75) [bluetooth-validate-socket-address-length-in-sco_sock_bind.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.3.3-3) [bugfix/all/bluetooth-validate-socket-address-length-in-sco_sock.patch]




More information about the kernel-sec-discuss mailing list