[kernel-sec-discuss] r4297 - active

Ben Hutchings benh at moszumanska.debian.org
Wed Mar 30 15:47:00 UTC 2016


Author: benh
Date: 2016-03-30 15:47:00 +0000 (Wed, 30 Mar 2016)
New Revision: 4297

Modified:
   active/CVE-2016-0821
   active/CVE-2016-2143
   active/CVE-2016-3157
   active/CVE-2016-partial-SMAP-bypass
Log:
Mark issues pending for {wheezy,jessie}-security

Modified: active/CVE-2016-0821
===================================================================
--- active/CVE-2016-0821	2016-03-30 14:07:16 UTC (rev 4296)
+++ active/CVE-2016-0821	2016-03-30 15:47:00 UTC (rev 4297)
@@ -6,5 +6,5 @@
 3.16-upstream-stable: pending (3.16.7-ckt27)
 3.2-upstream-stable: pending (3.2.79) [include-linux-poison.h-fix-list_poison-1-2-offset.patch]
 sid: released (4.3.1-1)
-3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u5) [bugfix/all/include-linux-poison.h-fix-list_poison-1-2-offset.patch]
+3.2-wheezy-security: pending (3.2.73-2+deb7u4) [bugfix/all/include-linux-poison.h-fix-list_poison-1-2-offset.patch]

Modified: active/CVE-2016-2143
===================================================================
--- active/CVE-2016-2143	2016-03-30 14:07:16 UTC (rev 4296)
+++ active/CVE-2016-2143	2016-03-30 15:47:00 UTC (rev 4297)
@@ -7,5 +7,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: pending (3.2.79) [s390-mm-four-page-table-levels-vs.-fork.patch]
 sid: released (4.4.6-1)
-3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u5) [bugfix/s390/s390-mm-four-page-table-levels-vs.-fork.patch]
+3.2-wheezy-security: pending (3.2.73-2+deb7u4) [bugfix/s390/s390-mm-four-page-table-levels-vs.-fork.patch]

Modified: active/CVE-2016-3157
===================================================================
--- active/CVE-2016-3157	2016-03-30 14:07:16 UTC (rev 4296)
+++ active/CVE-2016-3157	2016-03-30 15:47:00 UTC (rev 4297)
@@ -7,5 +7,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: pending (4.4.6-2) [bugfix/x86/x86-iopl-64-properly-context-switch-IOPL-on-Xen-PV.patch]
-3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u5) [bugfix/x86/x86-iopl-64-properly-context-switch-iopl-on-xen-pv.patch]
+3.2-wheezy-security: pending (3.2.73-2+deb7u4) [bugfix/x86/x86-iopl-64-properly-context-switch-iopl-on-xen-pv.patch]

Modified: active/CVE-2016-partial-SMAP-bypass
===================================================================
--- active/CVE-2016-partial-SMAP-bypass	2016-03-30 14:07:16 UTC (rev 4296)
+++ active/CVE-2016-partial-SMAP-bypass	2016-03-30 15:47:00 UTC (rev 4297)
@@ -7,5 +7,5 @@
 3.16-upstream-stable: released (3.16.7-ckt26) [a39881d103f27702f8057051f59196375b905f6a]
 3.2-upstream-stable: N/A "Vulnerable code not present, introduced in 63bcff2a307b9bcc712a8251eb27df8b2e117967 (v3.10-rc1)" 
 sid: released (4.4.4-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.7-ckt20-1+deb8u5) [bugfix/x86/x86-entry-compat-add-missing-clac-to-entry_int80_32.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present" 




More information about the kernel-sec-discuss mailing list