[kernel-sec-discuss] r4214 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed Mar 2 18:57:10 UTC 2016


Author: jmm
Date: 2016-03-02 18:57:10 +0000 (Wed, 02 Mar 2016)
New Revision: 4214

Modified:
   active/CVE-2015-7566
   active/CVE-2015-7833
   active/CVE-2015-8812
   active/CVE-2016-0723
   active/CVE-2016-2053
   active/CVE-2016-2085
   active/CVE-2016-2384
Log:
3.16.7-ckt25 released


Modified: active/CVE-2015-7566
===================================================================
--- active/CVE-2015-7566	2016-03-02 17:56:16 UTC (rev 4213)
+++ active/CVE-2015-7566	2016-03-02 18:57:10 UTC (rev 4214)
@@ -6,7 +6,7 @@
  bwh> Commit cac9b50b0d75a1d50d6c056ff65c005f3224c8e0 fixes a related issue.
 Bugs:
 upstream: released (4.5-rc2) [cb3232138e37129e88240a98a1d2aba2187ff57c]
-3.16-upstream-stable: pending (3.16.7-ckt25)
+3.16-upstream-stable: released (3.16.7-ckt25)
 3.2-upstream-stable: released (3.2.78) [usb-serial-visor-fix-crash-on-detecting-device-without-write_urbs.patch]
 2.6.32-upstream-stable: pending (2.6.32.71)
 sid: released (4.3.3-6) [bugfix/all/usb-serial-visor-fix-crash-on-detecting-device-without-write_urbs.patch]

Modified: active/CVE-2015-7833
===================================================================
--- active/CVE-2015-7833	2016-03-02 17:56:16 UTC (rev 4213)
+++ active/CVE-2015-7833	2016-03-02 18:57:10 UTC (rev 4214)
@@ -5,7 +5,7 @@
  bwh> have the first patch only.
 Bugs:
 upstream: released (4.5-rc1) [588afcc1c0e45358159090d95bf7b246fb67565f, fa52bd506f274b7619955917abfde355e3d19ffe]
-3.16-upstream-stable: pending (3.16.7-ckt25)
+3.16-upstream-stable: released (3.16.7-ckt25)
 3.2-upstream-stable: released (3.2.77) [usbvision-fix-overflow-of-interfaces-array.patch, usbvision-fix-crash-on-detecting-device-with-invalid.patch]
 2.6.32-upstream-stable: pending (2.6.32.71)
 sid: released (4.2.6-2) [bugfix/all/usbvision-fix-overflow-of-interfaces-array.patch, bugfix/all/media-usbvision-fix-crash-on-detecting-device-with-i.patch]

Modified: active/CVE-2015-8812
===================================================================
--- active/CVE-2015-8812	2016-03-02 17:56:16 UTC (rev 4213)
+++ active/CVE-2015-8812	2016-03-02 18:57:10 UTC (rev 4214)
@@ -5,7 +5,7 @@
  Partially fixed in 2.6.35 with 73a203d2014f50d874b9e40083ad481ca70408e8.
 Bugs:
 upstream: released (v4.5-rc1) [67f1aee6f45059fd6b0f5b0ecb2c97ad0451f6b3]
-3.16-upstream-stable: pending (3.16.7-ckt25)
+3.16-upstream-stable: released (3.16.7-ckt25)
 3.2-upstream-stable: released (3.2.78) [iw_cxgb3-fix-incorrectly-returning-error-on-success.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.4.2-1) [bugfix/all/iw_cxgb3-Fix-incorrectly-returning-error-on-success.patch]

Modified: active/CVE-2016-0723
===================================================================
--- active/CVE-2016-0723	2016-03-02 17:56:16 UTC (rev 4213)
+++ active/CVE-2016-0723	2016-03-02 18:57:10 UTC (rev 4214)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (4.5-rc2) [5c17c861a357e9458001f021a7afa7aab9937439]
-3.16-upstream-stable: pending (3.16.7-ckt25)
+3.16-upstream-stable: released (3.16.7-ckt25)
 3.2-upstream-stable: released (3.2.78) [tty-fix-unsafe-ldisc-reference-via-ioctl-tiocgetd.patch]
 2.6.32-upstream-stable: pending (2.6.32.71)
 sid: released (4.3.3-6) [bugfix/all/tty-fix-unsafe-ldisc-reference-via-ioctl-tiocgetd.patch]

Modified: active/CVE-2016-2053
===================================================================
--- active/CVE-2016-2053	2016-03-02 17:56:16 UTC (rev 4213)
+++ active/CVE-2016-2053	2016-03-02 18:57:10 UTC (rev 4214)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (4.3-rc1) [0d62e9dd6da45bbf0f33a8617afc5fe774c8f45f]
-3.16-upstream-stable: pending (3.16.7-ckt25)
+3.16-upstream-stable: released (3.16.7-ckt25)
 3.2-upstream-stable: N/A "Introduced by 3d167d68e3805ee45ed2e8412fc03ed919c54c24 (v3.13-rc1)"
 2.6.32-upstream-stable: N/A "Introduced by 3d167d68e3805ee45ed2e8412fc03ed919c54c24 (v3.13-rc1)"
 sid: N/A "vulnerable code is not enabled in Debian configuration"

Modified: active/CVE-2016-2085
===================================================================
--- active/CVE-2016-2085	2016-03-02 17:56:16 UTC (rev 4213)
+++ active/CVE-2016-2085	2016-03-02 18:57:10 UTC (rev 4214)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (4.5-rc4) [613317bd212c585c20796c10afe5daaa95d4b0a1]
-3.16-upstream-stable: pending (3.16.7-ckt25)
+3.16-upstream-stable: released (3.16.7-ckt25)
 3.2-upstream-stable: needed
 sid: ignored "EVM is not enabled"
 3.16-jessie-security: ignored "EVM is not enabled"

Modified: active/CVE-2016-2384
===================================================================
--- active/CVE-2016-2384	2016-03-02 17:56:16 UTC (rev 4213)
+++ active/CVE-2016-2384	2016-03-02 18:57:10 UTC (rev 4214)
@@ -3,7 +3,7 @@
 Notes:
 Bugs:
 upstream: released (4.5-rc4) [07d86ca93db7e5cdf4743564d98292042ec21af7]
-3.16-upstream-stable: pending (3.16.7-ckt25)
+3.16-upstream-stable: released (3.16.7-ckt25)
 3.2-upstream-stable: released (3.2.78) [alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]
 2.6.32-upstream-stable: needed
 sid: released (4.4.2-1) [bugfix/all/alsa-usb-audio-avoid-freeing-umidi-object-twice.patch]




More information about the kernel-sec-discuss mailing list