[kernel-sec-discuss] r4489 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sat Jun 25 11:01:53 UTC 2016


Author: carnil
Date: 2016-06-25 11:01:52 +0000 (Sat, 25 Jun 2016)
New Revision: 4489

Modified:
   active/CVE-2016-1237
   active/CVE-2016-4470
   active/CVE-2016-4794
   active/CVE-2016-4997
   active/CVE-2016-4998
Log:
Mark 4.6.2-2 as released

Modified: active/CVE-2016-1237
===================================================================
--- active/CVE-2016-1237	2016-06-25 07:53:08 UTC (rev 4488)
+++ active/CVE-2016-1237	2016-06-25 11:01:52 UTC (rev 4489)
@@ -6,6 +6,6 @@
 upstream: pending [999653786df6954a31044528ac3f7a5dadca08f4]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Introduced in v3.14-rc1 with 4ac7249ea5a0ceef9f8269f63f33cc873c3fac61"
-sid: pending (4.6.2-2) [bugfix/all/nfsd-check-permissions-when-setting-acls.patch]
+sid: released (4.6.2-2) [bugfix/all/nfsd-check-permissions-when-setting-acls.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/nfsd-check-permissions-when-setting-ACLs.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2016-4470
===================================================================
--- active/CVE-2016-4470	2016-06-25 07:53:08 UTC (rev 4488)
+++ active/CVE-2016-4470	2016-06-25 11:01:52 UTC (rev 4489)
@@ -5,6 +5,6 @@
 upstream: released (4.7-rc4) [38327424b40bcebe2de92d07312c89360ac9229a]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.6.2-2) [bugfix/all/keys-potential-uninitialized-variable.patch]
+sid: released (4.6.2-2) [bugfix/all/keys-potential-uninitialized-variable.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/keys-potential-uninitialized-variable.patch]
 3.2-wheezy-security: needed

Modified: active/CVE-2016-4794
===================================================================
--- active/CVE-2016-4794	2016-06-25 07:53:08 UTC (rev 4488)
+++ active/CVE-2016-4794	2016-06-25 11:01:52 UTC (rev 4489)
@@ -11,6 +11,6 @@
 upstream: released (4.7-rc4) [4f996e234dad488e5d9ba0858bc1bae12eff82c3, 6710e594f71ccaad8101bc64321152af7cd9ea28]
 3.16-upstream-stable: N/A "Introduced with 1a4d76076cda and 9c824b6a172c in 3.18-rc1"
 3.2-upstream-stable: N/A "Introduced with 1a4d76076cda and 9c824b6a172c in 3.18-rc1"
-sid: pending (4.6.2-2) [bugfix/all/percpu-fix-synchronization-between-chunk-map_extend_.patch, bugfix/all/percpu-fix-synchronization-between-synchronous-map-e.patch]
+sid: released (4.6.2-2) [bugfix/all/percpu-fix-synchronization-between-chunk-map_extend_.patch, bugfix/all/percpu-fix-synchronization-between-synchronous-map-e.patch]
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2016-4997
===================================================================
--- active/CVE-2016-4997	2016-06-25 07:53:08 UTC (rev 4488)
+++ active/CVE-2016-4997	2016-06-25 11:01:52 UTC (rev 4489)
@@ -5,6 +5,6 @@
 upstream: released (4.7-rc1) [fc1221b3a163d1386d1052184202d5dc50d302d1, ce683e5f9d045e5d67d1312a42b359cb2ab2a13c]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.6.2-2) [bugfix/all/netfilter-x_tables-add-compat-version-of-xt_check_en.patch, bugfix/all/netfilter-x_tables-check-for-bogus-target-offset.patch]
+sid: released (4.6.2-2) [bugfix/all/netfilter-x_tables-add-compat-version-of-xt_check_en.patch, bugfix/all/netfilter-x_tables-check-for-bogus-target-offset.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/netfilter-x_tables-add-compat-version-of-xt_check_en.patch, bugfix/all/netfilter-x_tables-check-for-bogus-target-offset.patch]
 3.2-wheezy-security: needed

Modified: active/CVE-2016-4998
===================================================================
--- active/CVE-2016-4998	2016-06-25 07:53:08 UTC (rev 4488)
+++ active/CVE-2016-4998	2016-06-25 11:01:52 UTC (rev 4489)
@@ -5,6 +5,6 @@
 upstream: released (4.7-rc1) [7d35812c3214afa5b37a675113555259cfd67b98, a08e4e190b866579896c09af59b3bdca821da2cd, 7ed2abddd20cf8f6bd27f65bd218f26fa5bf7f44, 13631bfc604161a9d69cd68991dff8603edd66f9, b7eba0f3515fca3296b8881d583f7c1042f5226]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.6.2-2) [bugfix/all/netfilter-x_tables-add-and-use-xt_check_entry_offset.patch, bugfix/all/netfilter-x_tables-assert-minimum-target-size.patch, bugfix/all/netfilter-x_tables-check-standard-target-size-too.patch, bugfix/all/netfilter-x_tables-validate-all-offsets-and-sizes-in.patch, bugfix/all/netfilter-x_tables-don-t-reject-valid-target-size-on.patch]
+sid: released (4.6.2-2) [bugfix/all/netfilter-x_tables-add-and-use-xt_check_entry_offset.patch, bugfix/all/netfilter-x_tables-assert-minimum-target-size.patch, bugfix/all/netfilter-x_tables-check-standard-target-size-too.patch, bugfix/all/netfilter-x_tables-validate-all-offsets-and-sizes-in.patch, bugfix/all/netfilter-x_tables-don-t-reject-valid-target-size-on.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/netfilter-x_tables-add-and-use-xt_check_entry_offset.patch, bugfix/all/netfilter-x_tables-assert-minimum-target-size.patch, bugfix/all/netfilter-x_tables-check-standard-target-size-too.patch, bugfix/all/netfilter-x_tables-validate-all-offsets-and-sizes-in.patch, bugfix/all/netfilter-x_tables-don-t-reject-valid-target-size-on.patch]
 3.2-wheezy-security: needed




More information about the kernel-sec-discuss mailing list