[kernel-sec-discuss] r4613 - active

Ben Hutchings benh at moszumanska.debian.org
Fri Sep 2 20:49:53 UTC 2016


Author: benh
Date: 2016-09-02 20:49:53 +0000 (Fri, 02 Sep 2016)
New Revision: 4613

Modified:
   active/CVE-2016-3857
   active/CVE-2016-4470
   active/CVE-2016-5696
   active/CVE-2016-5829
   active/CVE-2016-6136
   active/CVE-2016-6480
   active/CVE-2016-6828
Log:
Mark issues as released for wheezy

Modified: active/CVE-2016-3857
===================================================================
--- active/CVE-2016-3857	2016-09-02 20:49:13 UTC (rev 4612)
+++ active/CVE-2016-3857	2016-09-02 20:49:53 UTC (rev 4613)
@@ -8,4 +8,4 @@
 3.2-upstream-stable: needed
 sid: released (4.7.2-1)
 3.16-jessie-security: ignored "Feature is disabled and unlikely to be enabled in custom kernels"
-3.2-wheezy-security: pending (3.2.81-2) [bugfix/arm/arm-oabi-compat-add-missing-access-checks.patch]
+3.2-wheezy-security: released (3.2.81-2) [bugfix/arm/arm-oabi-compat-add-missing-access-checks.patch]

Modified: active/CVE-2016-4470
===================================================================
--- active/CVE-2016-4470	2016-09-02 20:49:13 UTC (rev 4612)
+++ active/CVE-2016-4470	2016-09-02 20:49:53 UTC (rev 4613)
@@ -7,4 +7,4 @@
 3.2-upstream-stable: released (3.2.82) [keys-potential-uninitialized-variable.patch]
 sid: released (4.6.2-2) [bugfix/all/keys-potential-uninitialized-variable.patch]
 3.16-jessie-security: released (3.16.7-ckt25-2+deb8u1) [bugfix/all/keys-potential-uninitialized-variable.patch]
-3.2-wheezy-security: pending (3.2.81-2) [bugfix/all/keys-potential-uninitialized-variable.patch]
+3.2-wheezy-security: released (3.2.81-2) [bugfix/all/keys-potential-uninitialized-variable.patch]

Modified: active/CVE-2016-5696
===================================================================
--- active/CVE-2016-5696	2016-09-02 20:49:13 UTC (rev 4612)
+++ active/CVE-2016-5696	2016-09-02 20:49:53 UTC (rev 4613)
@@ -15,4 +15,4 @@
 3.2-upstream-stable: released (3.2.82) [tcp-make-challenge-acks-less-predictable.patch]
 sid: released (4.7.2-1)
 3.16-jessie-security: pending (3.16.36-1+deb8u1) [bugfix/all/tcp-make-challenge-acks-less-predictable.patch]
-3.2-wheezy-security: pending (3.2.81-2) [bugfix/all/tcp-make-challenge-acks-less-predictable.patch]
+3.2-wheezy-security: released (3.2.81-2) [bugfix/all/tcp-make-challenge-acks-less-predictable.patch]

Modified: active/CVE-2016-5829
===================================================================
--- active/CVE-2016-5829	2016-09-02 20:49:13 UTC (rev 4612)
+++ active/CVE-2016-5829	2016-09-02 20:49:53 UTC (rev 4613)
@@ -7,4 +7,4 @@
 3.2-upstream-stable: released (3.2.82) [hid-hiddev-validate-num_values-for-hidiocgusages-hidiocsusages.patch]
 sid: released (4.6.3-1) [bugfix/all/HID-hiddev-validate-num_values-for-HIDIOCGUSAGES-HID.patch]
 3.16-jessie-security: released (3.16.7-ckt25-2+deb8u3) [bugfix/all/hid-hiddev-validate-num_values-for-hidiocgusages-hid.patch]
-3.2-wheezy-security: pending (3.2.81-2) [bugfix/all/hid-hiddev-validate-num_values-for-hidiocgusages-hid.patch]
+3.2-wheezy-security: released (3.2.81-2) [bugfix/all/hid-hiddev-validate-num_values-for-hidiocgusages-hid.patch]

Modified: active/CVE-2016-6136
===================================================================
--- active/CVE-2016-6136	2016-09-02 20:49:13 UTC (rev 4612)
+++ active/CVE-2016-6136	2016-09-02 20:49:53 UTC (rev 4613)
@@ -10,4 +10,4 @@
 3.2-upstream-stable: released (3.2.82) [audit-fix-a-double-fetch-in-audit_log_single_execve_arg.patch]
 sid: released (4.7.2-1)
 3.16-jessie-security: pending (3.16.36-1+deb8u1) [bugfix/all/audit-fix-a-double-fetch-in-audit_log_single_execve_arg.patch]
-3.2-wheezy-security: pending (3.2.81-2) [bugfix/all/audit-fix-a-double-fetch-in-audit_log_single_execve_arg.patch]
+3.2-wheezy-security: released (3.2.81-2) [bugfix/all/audit-fix-a-double-fetch-in-audit_log_single_execve_arg.patch]

Modified: active/CVE-2016-6480
===================================================================
--- active/CVE-2016-6480	2016-09-02 20:49:13 UTC (rev 4612)
+++ active/CVE-2016-6480	2016-09-02 20:49:53 UTC (rev 4613)
@@ -10,4 +10,4 @@
 3.2-upstream-stable: needed
 sid: released (4.7.2-1) [bugfix/all/aacraid-check-size-values-after-double-fetch-from-us.patch]
 3.16-jessie-security: pending (3.16.36-1+deb8u1) [bugfix/all/aacraid-Check-size-values-after-double-fetch-from-us.patch]
-3.2-wheezy-security: pending (3.2.81-2) [bugfix/all/aacraid-check-size-values-after-double-fetch-from-us.patch]
+3.2-wheezy-security: released (3.2.81-2) [bugfix/all/aacraid-check-size-values-after-double-fetch-from-us.patch]

Modified: active/CVE-2016-6828
===================================================================
--- active/CVE-2016-6828	2016-09-02 20:49:13 UTC (rev 4612)
+++ active/CVE-2016-6828	2016-09-02 20:49:53 UTC (rev 4613)
@@ -9,4 +9,4 @@
 3.2-upstream-stable: needed
 sid: released (4.7.2-1) [bugfix/all/tcp-fix-use-after-free-in-tcp_xmit_retransmit_queue.patch]
 3.16-jessie-security: pending (3.16.36-1+deb8u1) [bugfix/all/tcp-fix-use-after-free-in-tcp_xmit_retransmit_queue.patch]
-3.2-wheezy-security: pending (3.2.81-2) [bugfix/all/tcp-fix-use-after-free-in-tcp_xmit_retransmit_queue.patch]
+3.2-wheezy-security: released (3.2.81-2) [bugfix/all/tcp-fix-use-after-free-in-tcp_xmit_retransmit_queue.patch]




More information about the kernel-sec-discuss mailing list