[kernel-sec-discuss] r5234 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Thu Apr 27 18:45:29 UTC 2017


Author: carnil
Date: 2017-04-27 18:45:29 +0000 (Thu, 27 Apr 2017)
New Revision: 5234

Modified:
   active/CVE-2016-9604
   active/CVE-2017-2671
   active/CVE-2017-7374
   active/CVE-2017-7472
   active/CVE-2017-7616
   active/CVE-2017-7618
   active/CVE-2017-7889
   active/CVE-2017-8061
   active/CVE-2017-8063
   active/CVE-2017-8064
Log:
Update version to 4.9.25 for sid

Modified: active/CVE-2016-9604
===================================================================
--- active/CVE-2016-9604	2017-04-27 07:47:11 UTC (rev 5233)
+++ active/CVE-2016-9604	2017-04-27 18:45:29 UTC (rev 5234)
@@ -10,6 +10,6 @@
 4.9-upstream-stable: released (4.9.25) [a5c6e0a76817a3751f58d761aaff7c0b0c4001ff]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.24-1) [bugfix/all/keys-disallow-keyrings-beginning-with-.-to-be-joined.patch]
+sid: pending (4.9.25-1)
 3.16-jessie-security: pending (3.16.43-1) [bugfix/all/keys-disallow-keyrings-beginning-with-.-to-be-joined.patch]
 3.2-wheezy-security: pending (3.2.88-1) [bugfix/all/keys-disallow-keyrings-beginning-with-.-to-be-joined.patch]

Modified: active/CVE-2017-2671
===================================================================
--- active/CVE-2017-2671	2017-04-27 07:47:11 UTC (rev 5233)
+++ active/CVE-2017-2671	2017-04-27 18:45:29 UTC (rev 5234)
@@ -9,6 +9,6 @@
 4.9-upstream-stable: needed
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.24-1) [bugfix/all/ping-implement-proper-locking.patch]
+sid: pending (4.9.25-1) [bugfix/all/ping-implement-proper-locking.patch]
 3.16-jessie-security: pending (3.16.43-1) [bugfix/all/ping-implement-proper-locking.patch]
 3.2-wheezy-security: pending (3.2.88-1) [bugfix/all/ping-implement-proper-locking.patch]

Modified: active/CVE-2017-7374
===================================================================
--- active/CVE-2017-7374	2017-04-27 07:47:11 UTC (rev 5233)
+++ active/CVE-2017-7374	2017-04-27 18:45:29 UTC (rev 5234)
@@ -8,6 +8,6 @@
 4.9-upstream-stable: released (4.9.20) [2984e52c75c657db7901f6189f02e0251ca963c2]
 3.16-upstream-stable: N/A "Intoduced in 4.2-rc1 with b7236e21d55ff9008737621c84dd8ee6c37c7c6d"
 3.2-upstream-stable: N/A "Intoduced in 4.2-rc1 with b7236e21d55ff9008737621c84dd8ee6c37c7c6d"
-sid: pending (4.9.24-1)
+sid: pending (4.9.25-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-7472
===================================================================
--- active/CVE-2017-7472	2017-04-27 07:47:11 UTC (rev 5233)
+++ active/CVE-2017-7472	2017-04-27 18:45:29 UTC (rev 5234)
@@ -11,6 +11,6 @@
 4.9-upstream-stable: released (4.9.25) [174a74dbca2ddc7269c265598399c000e5b9b870]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.24-1) [bugfix/all/keys-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch]
+sid: pending (4.9.25-1)
 3.16-jessie-security: pending (3.16.43-1) [bugfix/all/keys-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch]
 3.2-wheezy-security: pending (3.2.88-1) [bugfix/all/keys-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch]

Modified: active/CVE-2017-7616
===================================================================
--- active/CVE-2017-7616	2017-04-27 07:47:11 UTC (rev 5233)
+++ active/CVE-2017-7616	2017-04-27 18:45:29 UTC (rev 5234)
@@ -7,6 +7,6 @@
 4.9-upstream-stable: released (4.9.22) [cddab768d13469d1e254fb8c0e1629f93c8dfaca]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.24-1)
+sid: pending (4.9.25-1)
 3.16-jessie-security: pending (3.16.43-1) [bugfix/all/mm-mempolicy.c-fix-error-handling-in-set_mempolicy-a.patch]
 3.2-wheezy-security: pending (3.2.88-1) [bugfix/all/mm-mempolicy.c-fix-error-handling-in-set_mempolicy-a.patch]

Modified: active/CVE-2017-7618
===================================================================
--- active/CVE-2017-7618	2017-04-27 07:47:11 UTC (rev 5233)
+++ active/CVE-2017-7618	2017-04-27 18:45:29 UTC (rev 5234)
@@ -10,6 +10,6 @@
 4.9-upstream-stable: released (4.9.24) [c10479591869177ae7ac0570b54ace6fbdeb57c2]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.24-1)
+sid: pending (4.9.25-1)
 3.16-jessie-security: pending (3.16.43-1) [bugfix/all/crypto-ahash-fix-einprogress-notification-callback.patch]
 3.2-wheezy-security: pending (3.2.88-1) [bugfix/all/crypto-ahash-fix-einprogress-notification-callback.patch]

Modified: active/CVE-2017-7889
===================================================================
--- active/CVE-2017-7889	2017-04-27 07:47:11 UTC (rev 5233)
+++ active/CVE-2017-7889	2017-04-27 18:45:29 UTC (rev 5234)
@@ -11,6 +11,6 @@
 4.9-upstream-stable: released (4.9.24) [2c0ad235ac77f2fc2eee593bf06822cad772e0e2]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.24-1)
+sid: pending (4.9.25-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-8061
===================================================================
--- active/CVE-2017-8061	2017-04-27 07:47:11 UTC (rev 5233)
+++ active/CVE-2017-8061	2017-04-27 18:45:29 UTC (rev 5234)
@@ -6,6 +6,6 @@
 4.9-upstream-stable: released (4.9.24) [28d1e8b7ef81d254583f68627095f8a85e39597d]
 3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
 3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
-sid: pending (4.9.24-1)
+sid: pending (4.9.25-1)
 3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"
 3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9-rc1"

Modified: active/CVE-2017-8063
===================================================================
--- active/CVE-2017-8063	2017-04-27 07:47:11 UTC (rev 5233)
+++ active/CVE-2017-8063	2017-04-27 18:45:29 UTC (rev 5234)
@@ -6,6 +6,6 @@
 4.9-upstream-stable: released (4.9.24) ([fb00319317c152bf3528df13a54c28bf8c5daa55]
 3.16-upstream-stable: N/A "introduced in 4.9-rc4 with 17ce039b4e54"
 3.2-upstream-stable: N/A "introduced in 4.9-rc4 with 17ce039b4e54"
-sid: pending (4.9.24-1)
+sid: pending (4.9.25-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-8064
===================================================================
--- active/CVE-2017-8064	2017-04-27 07:47:11 UTC (rev 5233)
+++ active/CVE-2017-8064	2017-04-27 18:45:29 UTC (rev 5234)
@@ -8,6 +8,6 @@
 4.9-upstream-stable: released (4.9.24) [1992564156b5dc4ac73418e5b95e1a43f12f3cb1]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.9.24-1)
+sid: pending (4.9.25-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"




More information about the kernel-sec-discuss mailing list