[kernel-sec-discuss] r4512 - active

Ben Hutchings benh at moszumanska.debian.org
Sun Jul 3 14:26:18 UTC 2016


Author: benh
Date: 2016-07-03 14:26:18 +0000 (Sun, 03 Jul 2016)
New Revision: 4512

Modified:
   active/CVE-2016-4470
   active/CVE-2016-4997
   active/CVE-2016-4998
   active/CVE-2016-5829
Log:
Update status of issues in wheezy

Modified: active/CVE-2016-4470
===================================================================
--- active/CVE-2016-4470	2016-07-03 14:14:44 UTC (rev 4511)
+++ active/CVE-2016-4470	2016-07-03 14:26:18 UTC (rev 4512)
@@ -7,4 +7,4 @@
 3.2-upstream-stable: needed
 sid: released (4.6.2-2) [bugfix/all/keys-potential-uninitialized-variable.patch]
 3.16-jessie-security: released (3.16.7-ckt25-2+deb8u1) [bugfix/all/keys-potential-uninitialized-variable.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.81-2) [bugfix/all/keys-potential-uninitialized-variable.patch]

Modified: active/CVE-2016-4997
===================================================================
--- active/CVE-2016-4997	2016-07-03 14:14:44 UTC (rev 4511)
+++ active/CVE-2016-4997	2016-07-03 14:26:18 UTC (rev 4512)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (4.7-rc1) [fc1221b3a163d1386d1052184202d5dc50d302d1, ce683e5f9d045e5d67d1312a42b359cb2ab2a13c]
 3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: ignored "too many changes required, and netfilter is not exposed to unprivileged users"
 sid: released (4.6.2-2) [bugfix/all/netfilter-x_tables-add-compat-version-of-xt_check_en.patch, bugfix/all/netfilter-x_tables-check-for-bogus-target-offset.patch]
 3.16-jessie-security: released (3.16.7-ckt25-2+deb8u1) [bugfix/all/netfilter-x_tables-add-compat-version-of-xt_check_en.patch, bugfix/all/netfilter-x_tables-check-for-bogus-target-offset.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: ignored "too many changes required, and netfilter is not exposed to unprivileged users"

Modified: active/CVE-2016-4998
===================================================================
--- active/CVE-2016-4998	2016-07-03 14:14:44 UTC (rev 4511)
+++ active/CVE-2016-4998	2016-07-03 14:26:18 UTC (rev 4512)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (4.7-rc1) [7d35812c3214afa5b37a675113555259cfd67b98, a08e4e190b866579896c09af59b3bdca821da2cd, 7ed2abddd20cf8f6bd27f65bd218f26fa5bf7f44, 13631bfc604161a9d69cd68991dff8603edd66f9, b7eba0f3515fca3296b8881d583f7c1042f5226]
 3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: ignored "too many changes required, and netfilter is not exposed to unprivileged users"
 sid: released (4.6.2-2) [bugfix/all/netfilter-x_tables-add-and-use-xt_check_entry_offset.patch, bugfix/all/netfilter-x_tables-assert-minimum-target-size.patch, bugfix/all/netfilter-x_tables-check-standard-target-size-too.patch, bugfix/all/netfilter-x_tables-validate-all-offsets-and-sizes-in.patch, bugfix/all/netfilter-x_tables-don-t-reject-valid-target-size-on.patch]
 3.16-jessie-security: released (3.16.7-ckt25-2+deb8u1) [bugfix/all/netfilter-x_tables-add-and-use-xt_check_entry_offset.patch, bugfix/all/netfilter-x_tables-assert-minimum-target-size.patch, bugfix/all/netfilter-x_tables-check-standard-target-size-too.patch, bugfix/all/netfilter-x_tables-validate-all-offsets-and-sizes-in.patch, bugfix/all/netfilter-x_tables-don-t-reject-valid-target-size-on.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: ignored "too many changes required, and netfilter is not exposed to unprivileged users"

Modified: active/CVE-2016-5829
===================================================================
--- active/CVE-2016-5829	2016-07-03 14:14:44 UTC (rev 4511)
+++ active/CVE-2016-5829	2016-07-03 14:26:18 UTC (rev 4512)
@@ -7,4 +7,4 @@
 3.2-upstream-stable: needed
 sid: pending (4.6.3-1) [bugfix/all/HID-hiddev-validate-num_values-for-HIDIOCGUSAGES-HID.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u3) [bugfix/all/hid-hiddev-validate-num_values-for-hidiocgusages-hid.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.81-2) [bugfix/all/hid-hiddev-validate-num_values-for-hidiocgusages-hid.patch]




More information about the kernel-sec-discuss mailing list