[kernel-sec-discuss] r4344 - active

Ben Hutchings benh at moszumanska.debian.org
Sun May 1 23:20:56 UTC 2016


Author: benh
Date: 2016-05-01 23:20:56 +0000 (Sun, 01 May 2016)
New Revision: 4344

Modified:
   active/CVE-2015-7515
   active/CVE-2016-0821
   active/CVE-2016-2143
   active/CVE-2016-2184
   active/CVE-2016-2185
   active/CVE-2016-2186
   active/CVE-2016-3134
   active/CVE-2016-3136
   active/CVE-2016-3137
   active/CVE-2016-3138
   active/CVE-2016-3140
   active/CVE-2016-3156
   active/CVE-2016-3157
   active/CVE-2016-3672
   active/CVE-2016-3951
   active/CVE-2016-3955
Log:
Mark all issues fixed in 3.2.79 and 3.2.80 pending for wheezy-security

Modified: active/CVE-2015-7515
===================================================================
--- active/CVE-2015-7515	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2015-7515	2016-05-01 23:20:56 UTC (rev 4344)
@@ -10,4 +10,4 @@
 3.2-upstream-stable: released (3.2.79) [input-aiptek-fix-crash-on-detecting-device-without-endpoints.patch]
 sid: released (4.4.2-1)
 3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-0821
===================================================================
--- active/CVE-2016-0821	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-0821	2016-05-01 23:20:56 UTC (rev 4344)
@@ -7,4 +7,4 @@
 3.2-upstream-stable: released (3.2.79) [include-linux-poison.h-fix-list_poison-1-2-offset.patch]
 sid: released (4.3.1-1)
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/include-linux-poison.h-fix-list_poison-1-2-offset.patch]
-3.2-wheezy-security: pending (3.2.80-1) [bugfix/all/include-linux-poison.h-fix-list_poison-1-2-offset.patch]
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-2143
===================================================================
--- active/CVE-2016-2143	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-2143	2016-05-01 23:20:56 UTC (rev 4344)
@@ -8,4 +8,4 @@
 3.2-upstream-stable: released (3.2.79) [s390-mm-four-page-table-levels-vs.-fork.patch]
 sid: released (4.4.6-1)
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/s390/s390-mm-four-page-table-levels-vs.-fork.patch]
-3.2-wheezy-security: pending (3.2.80-1) [bugfix/s390/s390-mm-four-page-table-levels-vs.-fork.patch]
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-2184
===================================================================
--- active/CVE-2016-2184	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-2184	2016-05-01 23:20:56 UTC (rev 4344)
@@ -10,4 +10,4 @@
 3.2-upstream-stable: released (3.2.80) [alsa-usb-audio-fix-null-dereference-in-create_fixed_stream_quirk.patch, alsa-usb-audio-add-sanity-checks-for-endpoint-accesses.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-2185
===================================================================
--- active/CVE-2016-2185	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-2185	2016-05-01 23:20:56 UTC (rev 4344)
@@ -10,4 +10,4 @@
 3.2-upstream-stable: released (3.2.80) [input-ati_remote2-fix-crashes-on-detecting-device-with-invalid.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-2186
===================================================================
--- active/CVE-2016-2186	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-2186	2016-05-01 23:20:56 UTC (rev 4344)
@@ -10,4 +10,4 @@
 3.2-upstream-stable: released (3.2.80) [input-powermate-fix-oops-with-malicious-usb-descriptors.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-3134
===================================================================
--- active/CVE-2016-3134	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-3134	2016-05-01 23:20:56 UTC (rev 4344)
@@ -16,4 +16,4 @@
 3.2-upstream-stable: released (3.2.80) [netfilter-x_tables-validate-e-target_offset-early.patch, netfilter-x_tables-make-sure-e-next_offset-covers-remaining-blob.patch]
 sid: released (4.5.1-1) [bugfix/all/netfilter-x_tables-validate-e-target_offset-early.patch, bugfix/all/netfilter-x_tables-make-sure-e-next_offset-covers-re.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/netfilter-x_tables-validate-e-target_offset-early.patch, bugfix/all/netfilter-x_tables-make-sure-e-next_offset-covers-remaining-blob.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-3136
===================================================================
--- active/CVE-2016-3136	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-3136	2016-05-01 23:20:56 UTC (rev 4344)
@@ -9,4 +9,4 @@
 3.2-upstream-stable: released (3.2.80) [usb-mct_u232-add-sanity-checking-in-probe.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-3137
===================================================================
--- active/CVE-2016-3137	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-3137	2016-05-01 23:20:56 UTC (rev 4344)
@@ -9,4 +9,4 @@
 3.2-upstream-stable: released (3.2.80) [usb-cypress_m8-add-endpoint-sanity-check.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-3138
===================================================================
--- active/CVE-2016-3138	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-3138	2016-05-01 23:20:56 UTC (rev 4344)
@@ -9,4 +9,4 @@
 3.2-upstream-stable: released (3.2.80) [usb-cdc-acm-more-sanity-checking.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-3140
===================================================================
--- active/CVE-2016-3140	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-3140	2016-05-01 23:20:56 UTC (rev 4344)
@@ -10,4 +10,4 @@
 3.2-upstream-stable: released (3.2.80) [usb-digi_acceleport-do-sanity-checking-for-the-number-of-ports.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: needed
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-3156
===================================================================
--- active/CVE-2016-3156	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-3156	2016-05-01 23:20:56 UTC (rev 4344)
@@ -7,4 +7,4 @@
 3.2-upstream-stable: released (3.2.80) [ipv4-don-t-do-expensive-useless-work-during-inetdev-destroy.patch]
 sid: released (4.5.1-1) [bugfix/all/ipv4-don-t-do-expensive-useless-work-during-inetdev-.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/ipv4-don-t-do-expensive-useless-work-during-inetdev-.patch]
-3.2-wheezy-security: needed
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-3157
===================================================================
--- active/CVE-2016-3157	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-3157	2016-05-01 23:20:56 UTC (rev 4344)
@@ -8,4 +8,4 @@
 3.2-upstream-stable: released (3.2.80) [x86-iopl-64-properly-context-switch-iopl-on-xen-pv.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/x86/x86-iopl-64-properly-context-switch-iopl-on-xen-pv.patch]
-3.2-wheezy-security: pending (3.2.80-1) [bugfix/x86/x86-iopl-64-properly-context-switch-iopl-on-xen-pv.patch]
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-3672
===================================================================
--- active/CVE-2016-3672	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-3672	2016-05-01 23:20:56 UTC (rev 4344)
@@ -11,4 +11,4 @@
 3.2-upstream-stable: released (3.2.80) [x86-standardize-mmap_rnd-usage.patch, x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
 sid: released (4.5.1-1) [bugfix/all/x86-mm-32-enable-full-randomization-on-i386-and-x86_.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/x86/x86-standardize-mmap_rnd-usage.patch, bugfix/x86/x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
-3.2-wheezy-security: pending (3.2.80-1) [bugfix/x86/x86-standardize-mmap_rnd-usage.patch, bugfix/x86/x86-mm-32-enable-full-randomization-on-i386-and-x86_32.patch]
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-3951
===================================================================
--- active/CVE-2016-3951	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-3951	2016-05-01 23:20:56 UTC (rev 4344)
@@ -8,4 +8,4 @@
 3.2-upstream-stable: released (3.2.80) [usbnet-cleanup-after-bind-in-probe.patch]
 sid: released (4.5.1-1)
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/cdc_ncm-do-not-call-usbnet_link_change-from-cdc_ncm_.patch, bugfix/all/usbnet-cleanup-after-bind-in-probe.patch]
-3.2-wheezy-security: pending (3.2.80-1) [bugfix/all/usbnet-cleanup-after-bind-in-probe.patch]
+3.2-wheezy-security: pending (3.2.80-1)

Modified: active/CVE-2016-3955
===================================================================
--- active/CVE-2016-3955	2016-05-01 23:15:33 UTC (rev 4343)
+++ active/CVE-2016-3955	2016-05-01 23:20:56 UTC (rev 4344)
@@ -7,4 +7,4 @@
 3.2-upstream-stable: released (3.2.80) [usb-usbip-fix-potential-out-of-bounds-write.patch]
 sid: released (4.5.2-1) [bugfix/all/USB-usbip-fix-potential-out-of-bounds-write.patch]
 3.16-jessie-security: pending (3.16.7-ckt25-2+deb8u1) [bugfix/all/USB-usbip-fix-potential-out-of-bounds-write.patch]
-3.2-wheezy-security: pending (3.2.80-1) [bugfix/all/USB-usbip-fix-potential-out-of-bounds-write.patch]
+3.2-wheezy-security: pending (3.2.80-1)




More information about the kernel-sec-discuss mailing list