[kernel-sec-discuss] r4343 - active

Ben Hutchings benh at moszumanska.debian.org
Sun May 1 23:15:33 UTC 2016


Author: benh
Date: 2016-05-01 23:15:33 +0000 (Sun, 01 May 2016)
New Revision: 4343

Modified:
   active/CVE-2016-0821
   active/CVE-2016-2143
   active/CVE-2016-3157
   active/CVE-2016-3672
   active/CVE-2016-3951
   active/CVE-2016-3955
Log:
Update pending wheezy-security version

Modified: active/CVE-2016-0821
===================================================================
--- active/CVE-2016-0821	2016-05-01 21:52:04 UTC (rev 4342)
+++ active/CVE-2016-0821	2016-05-01 23:15:33 UTC (rev 4343)
@@ -7,4 +7,4 @@
 3.2-upstream-stable: released (3.2.79) [include-linux-poison.h-fix-list_poison-1-2-offset.patch]
 sid: released (4.3.1-1)
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/include-linux-poison.h-fix-list_poison-1-2-offset.patch]
-3.2-wheezy-security: pending (3.2.78-1+deb7u1) [bugfix/all/include-linux-poison.h-fix-list_poison-1-2-offset.patch]
+3.2-wheezy-security: pending (3.2.80-1) [bugfix/all/include-linux-poison.h-fix-list_poison-1-2-offset.patch]

Modified: active/CVE-2016-2143
===================================================================
--- active/CVE-2016-2143	2016-05-01 21:52:04 UTC (rev 4342)
+++ active/CVE-2016-2143	2016-05-01 23:15:33 UTC (rev 4343)
@@ -8,4 +8,4 @@
 3.2-upstream-stable: released (3.2.79) [s390-mm-four-page-table-levels-vs.-fork.patch]
 sid: released (4.4.6-1)
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/s390/s390-mm-four-page-table-levels-vs.-fork.patch]
-3.2-wheezy-security: pending (3.2.78-1+deb7u1) [bugfix/s390/s390-mm-four-page-table-levels-vs.-fork.patch]
+3.2-wheezy-security: pending (3.2.80-1) [bugfix/s390/s390-mm-four-page-table-levels-vs.-fork.patch]

Modified: active/CVE-2016-3157
===================================================================
--- active/CVE-2016-3157	2016-05-01 21:52:04 UTC (rev 4342)
+++ active/CVE-2016-3157	2016-05-01 23:15:33 UTC (rev 4343)
@@ -8,4 +8,4 @@
 3.2-upstream-stable: released (3.2.80) [x86-iopl-64-properly-context-switch-iopl-on-xen-pv.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/x86/x86-iopl-64-properly-context-switch-iopl-on-xen-pv.patch]
-3.2-wheezy-security: pending (3.2.78-1+deb7u1) [bugfix/x86/x86-iopl-64-properly-context-switch-iopl-on-xen-pv.patch]
+3.2-wheezy-security: pending (3.2.80-1) [bugfix/x86/x86-iopl-64-properly-context-switch-iopl-on-xen-pv.patch]

Modified: active/CVE-2016-3672
===================================================================
--- active/CVE-2016-3672	2016-05-01 21:52:04 UTC (rev 4342)
+++ active/CVE-2016-3672	2016-05-01 23:15:33 UTC (rev 4343)
@@ -11,4 +11,4 @@
 3.2-upstream-stable: released (3.2.80) [x86-standardize-mmap_rnd-usage.patch, x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
 sid: released (4.5.1-1) [bugfix/all/x86-mm-32-enable-full-randomization-on-i386-and-x86_.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/x86/x86-standardize-mmap_rnd-usage.patch, bugfix/x86/x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
-3.2-wheezy-security: pending (3.2.78-1+deb7u1) [bugfix/x86/x86-standardize-mmap_rnd-usage.patch, bugfix/x86/x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
+3.2-wheezy-security: pending (3.2.80-1) [bugfix/x86/x86-standardize-mmap_rnd-usage.patch, bugfix/x86/x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]

Modified: active/CVE-2016-3951
===================================================================
--- active/CVE-2016-3951	2016-05-01 21:52:04 UTC (rev 4342)
+++ active/CVE-2016-3951	2016-05-01 23:15:33 UTC (rev 4343)
@@ -8,4 +8,4 @@
 3.2-upstream-stable: released (3.2.80) [usbnet-cleanup-after-bind-in-probe.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/cdc_ncm-do-not-call-usbnet_link_change-from-cdc_ncm_.patch, bugfix/all/usbnet-cleanup-after-bind-in-probe.patch]
-3.2-wheezy-security: pending (3.2.78-1+deb7u1) [bugfix/all/usbnet-cleanup-after-bind-in-probe.patch]
+3.2-wheezy-security: pending (3.2.80-1) [bugfix/all/usbnet-cleanup-after-bind-in-probe.patch]

Modified: active/CVE-2016-3955
===================================================================
--- active/CVE-2016-3955	2016-05-01 21:52:04 UTC (rev 4342)
+++ active/CVE-2016-3955	2016-05-01 23:15:33 UTC (rev 4343)
@@ -7,4 +7,4 @@
 3.2-upstream-stable: released (3.2.80) [usb-usbip-fix-potential-out-of-bounds-write.patch]
 sid: released (4.5.2-1) [bugfix/all/USB-usbip-fix-potential-out-of-bounds-write.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/USB-usbip-fix-potential-out-of-bounds-write.patch]
-3.2-wheezy-security: pending (3.2.78-1+deb7u1) [bugfix/all/USB-usbip-fix-potential-out-of-bounds-write.patch]
+3.2-wheezy-security: pending (3.2.80-1) [bugfix/all/USB-usbip-fix-potential-out-of-bounds-write.patch]




More information about the kernel-sec-discuss mailing list