[kernel-sec-discuss] r4227 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sun Mar 6 19:06:29 UTC 2016


Author: carnil
Date: 2016-03-06 19:06:29 +0000 (Sun, 06 Mar 2016)
New Revision: 4227

Added:
   active/CVE-2016-2847
Modified:
   active/CVE-2013-4312
Log:
Splitup of CVE-2013-4312 and CVE-2016-2847

Modified: active/CVE-2013-4312
===================================================================
--- active/CVE-2013-4312	2016-03-05 04:58:35 UTC (rev 4226)
+++ active/CVE-2013-4312	2016-03-06 19:06:29 UTC (rev 4227)
@@ -11,11 +11,11 @@
  carnil> for possible regressions/problems.
 Bugs:
  https://bugzilla.kernel.org/show_bug.cgi?id=20402
-upstream: released (4.5-rc1) [712f4aad406bb1ed67f3f98d04c044191f0ff593, 759c01142a5d0f364a462346168a56de28a80f52]
+upstream: released (4.5-rc1) [712f4aad406bb1ed67f3f98d04c044191f0ff593]
 3.16-upstream-stable: needed
-3.2-upstream-stable: released (3.2.78) [unix-properly-account-for-fds-passed-over-unix-sockets.patch, pipe-limit-the-per-user-amount-of-pages-allocated-in.patch]
+3.2-upstream-stable: released (v3.2.78) [a5a6cf8c405e826ff7ed1308dde72560c0ed4854]
 2.6.32-upstream-stable: ignored
-sid: released (4.3.5-1) [bugfix/all/pipe-limit-the-per-user-amount-of-pages-allocated-in.patch]
-3.16-jessie-security: released (3.16.7-ckt20-1+deb8u4) [bugfix/all/unix-properly-account-for-FDs-passed-over-unix-socke.patch, bugfix/all/pipe-limit-the-per-user-amount-of-pages-allocated-in.patch]
-3.2-wheezy-security: released (3.2.73-2+deb7u3) [bugfix/all/unix-properly-account-for-FDs-passed-over-unix-socke.patch, bugfix/all/pipe-limit-the-per-user-amount-of-pages-allocated-in.patch]
+sid: released (4.3.3-6) [bugfix/all/unix-properly-account-for-FDs-passed-over-unix-socke.patch]
+3.16-jessie-security: released (3.16.7-ckt20-1+deb8u3) [bugfix/all/unix-properly-account-for-FDs-passed-over-unix-socke.patch]
+3.2-wheezy-security: released (3.2.73-2+deb7u3) [bugfix/all/unix-properly-account-for-FDs-passed-over-unix-socke.patch]
 2.6.32-squeeze-security: ignored "Too risky to backport at EOL"

Added: active/CVE-2016-2847
===================================================================
--- active/CVE-2016-2847	                        (rev 0)
+++ active/CVE-2016-2847	2016-03-06 19:06:29 UTC (rev 4227)
@@ -0,0 +1,10 @@
+Description: pipe: limit the per-user amount of pages allocated in pipes
+References:
+Notes:
+Bugs:
+upstream: released (v4.5-rc1) [759c01142a5d0f364a462346168a56de28a80f52]
+3.16-upstream-stable:
+3.2-upstream-stable: released (v3.2.78) [92375b85b70395c8180991084c05e8d78e55d066]
+sid: released (4.3.5-1) [bugfix/all/pipe-limit-the-per-user-amount-of-pages-allocated-in.patch]
+3.16-jessie-security: released (3.16.7-ckt20-1+deb8u4) [bugfix/all/pipe-limit-the-per-user-amount-of-pages-allocated-in.patch]
+3.2-wheezy-security: released (3.2.73-2+deb7u3) [bugfix/all/pipe-limit-the-per-user-amount-of-pages-allocated-in.patch]




More information about the kernel-sec-discuss mailing list