[kernel-sec-discuss] r5770 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Sat Dec 9 08:43:22 UTC 2017
Author: carnil
Date: 2017-12-09 08:43:22 +0000 (Sat, 09 Dec 2017)
New Revision: 5770
Modified:
active/CVE-2017-0786
active/CVE-2017-1000405
active/CVE-2017-12190
active/CVE-2017-12192
active/CVE-2017-12193
active/CVE-2017-13080
active/CVE-2017-15115
active/CVE-2017-15265
active/CVE-2017-15299
active/CVE-2017-15649
active/CVE-2017-16525
active/CVE-2017-16527
active/CVE-2017-16529
active/CVE-2017-16530
active/CVE-2017-16531
active/CVE-2017-16532
active/CVE-2017-16533
active/CVE-2017-16535
active/CVE-2017-16536
active/CVE-2017-16537
active/CVE-2017-16643
active/CVE-2017-16649
active/CVE-2017-16650
active/CVE-2017-8831
Log:
Mark 3.16.51-1 as released
Modified: active/CVE-2017-0786
===================================================================
--- active/CVE-2017-0786 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-0786 2017-12-09 08:43:22 UTC (rev 5770)
@@ -10,5 +10,5 @@
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.13.4-2) [bugfix/all/brcmfmac-add-length-check-in-brcmf_cfg80211_escan_ha.patch]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-1000405
===================================================================
--- active/CVE-2017-1000405 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-1000405 2017-12-09 08:43:22 UTC (rev 5770)
@@ -13,5 +13,5 @@
3.2-upstream-stable: needed
sid: released (4.14.2-1) [bugfix/all/mm-thp-Do-not-make-page-table-dirty-unconditionally-.patch]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: needed
Modified: active/CVE-2017-12190
===================================================================
--- active/CVE-2017-12190 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-12190 2017-12-09 08:43:22 UTC (rev 5770)
@@ -16,5 +16,5 @@
3.2-upstream-stable: released (3.2.95) [9ff5d8fe36745867da8a028b3ea58629f7546155]
sid: released (4.13.10-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-12192
===================================================================
--- active/CVE-2017-12192 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-12192 2017-12-09 08:43:22 UTC (rev 5770)
@@ -9,5 +9,5 @@
3.2-upstream-stable: N/A "Vulnerable code introduced later in 3.13-rc1"
sid: released (4.13.4-2) [bugfix/all/KEYS-prevent-KEYCTL_READ-on-negative-key.patch]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-12193
===================================================================
--- active/CVE-2017-12193 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-12193 2017-12-09 08:43:22 UTC (rev 5770)
@@ -8,5 +8,5 @@
3.2-upstream-stable: N/A "Introduced in 3.13-rc1 with 3cb989501c2688cacbb7dc4b0d353faf838f53a1"
sid: released (4.13.13-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-13080
===================================================================
--- active/CVE-2017-13080 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-13080 2017-12-09 08:43:22 UTC (rev 5770)
@@ -14,5 +14,5 @@
3.2-upstream-stable: released (3.2.95) [ef810e7c3d2a8fb3bbd23726599c487c30ea747e]
sid: released (4.13.13-1) [bugfix/all/mac80211-accept-key-reinstall-without-changing-anyth.patch]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-15115
===================================================================
--- active/CVE-2017-15115 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-15115 2017-12-09 08:43:22 UTC (rev 5770)
@@ -8,5 +8,5 @@
3.2-upstream-stable: released (3.2.96) [sctp-do-not-peel-off-an-assoc-from-one-netns-to-another-one.patch]
sid: released (4.13.13-1) [16585babafe54375f23f73a8fc323bd51e7955d7]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-15265
===================================================================
--- active/CVE-2017-15265 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-15265 2017-12-09 08:43:22 UTC (rev 5770)
@@ -15,5 +15,5 @@
3.2-upstream-stable: released (3.2.95) [c3895a053b2505f9e409e6d6c57dcece714ab486]
sid: released (4.13.4-2) [bugfix/all/ALSA-seq-Fix-use-after-free-at-creating-a-port.patch]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-15299
===================================================================
--- active/CVE-2017-15299 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-15299 2017-12-09 08:43:22 UTC (rev 5770)
@@ -19,5 +19,5 @@
3.2-upstream-stable: released (3.2.95) [57f94e88bb255bf7b7d267c999aefbe4557307c1]
sid: released (4.13.10-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-15649
===================================================================
--- active/CVE-2017-15649 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-15649 2017-12-09 08:43:22 UTC (rev 5770)
@@ -10,5 +10,5 @@
3.2-upstream-stable: released (3.2.95) [b2e1f10f138c6cc03a2f5c940b6c4963b07c7296, ca3d015d39f0357889fa3ef6a88028162de17d7d]
sid: released (4.13.10-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16525
===================================================================
--- active/CVE-2017-16525 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16525 2017-12-09 08:43:22 UTC (rev 5770)
@@ -13,5 +13,5 @@
3.2-upstream-stable: released (3.2.96) [b92072aadd839c9379190979edac63285ae2b790]
sid: released (4.13.10-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16527
===================================================================
--- active/CVE-2017-16527 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16527 2017-12-09 08:43:22 UTC (rev 5770)
@@ -10,5 +10,5 @@
3.2-upstream-stable: released (3.2.95) [72f4b1c7114c1b34302999d72bc5b16c8c1a1945]
sid: released (4.13.10-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16529
===================================================================
--- active/CVE-2017-16529 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16529 2017-12-09 08:43:22 UTC (rev 5770)
@@ -10,5 +10,5 @@
3.2-upstream-stable: released (3.2.95) [8a930044f0b100d6b28a94525e9cf62787b3ec3a]
sid: released (4.13.10-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16530
===================================================================
--- active/CVE-2017-16530 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16530 2017-12-09 08:43:22 UTC (rev 5770)
@@ -10,5 +10,5 @@
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.13.10-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-16531
===================================================================
--- active/CVE-2017-16531 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16531 2017-12-09 08:43:22 UTC (rev 5770)
@@ -10,5 +10,5 @@
3.2-upstream-stable: released (3.2.95) [a0e0a5850211dd09725c819a8915c2cbe9067317]
sid: released (4.13.10-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16532
===================================================================
--- active/CVE-2017-16532 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16532 2017-12-09 08:43:22 UTC (rev 5770)
@@ -9,5 +9,5 @@
3.2-upstream-stable: released (3.2.95) [f2a780301ae85dbe704499675832487130b8e267]
sid: released (4.13.13-1) [bugfix/all/usb-usbtest-fix-NULL-pointer-dereference.patch]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16533
===================================================================
--- active/CVE-2017-16533 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16533 2017-12-09 08:43:22 UTC (rev 5770)
@@ -9,5 +9,5 @@
3.2-upstream-stable: released (3.2.95) [99de0781e0de7c866f762b931351c2a501c3074f]
sid: released (4.13.10-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16535
===================================================================
--- active/CVE-2017-16535 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16535 2017-12-09 08:43:22 UTC (rev 5770)
@@ -9,5 +9,5 @@
3.2-upstream-stable: released (3.2.95) [7c27b82fad16d2804c7c8405316a636f57edeabd]
sid: released (4.13.10-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16536
===================================================================
--- active/CVE-2017-16536 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16536 2017-12-09 08:43:22 UTC (rev 5770)
@@ -11,5 +11,5 @@
3.2-upstream-stable: released (3.2.96) [59a7195cd497d430d9f76bc9f71cf53ed4102743]
sid: released (4.13.13-1) [bugfix/all/media-cx231xx-cards-fix-null-deref-on-missing-associ.patch]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16537
===================================================================
--- active/CVE-2017-16537 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16537 2017-12-09 08:43:22 UTC (rev 5770)
@@ -11,5 +11,5 @@
3.2-upstream-stable: released (3.2.96) [0df873c63e8e99a8fb6e068d182b860e6e6e07a9]
sid: released (4.13.13-1) [bugfix/all/media-imon-fix-null-ptr-deref-in-imon_probe.patch]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16643
===================================================================
--- active/CVE-2017-16643 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16643 2017-12-09 08:43:22 UTC (rev 5770)
@@ -10,5 +10,5 @@
3.2-upstream-stable: released (3.2.96) [2de544fd1b16f76f8dd1213d585ce611155ccd34]
sid: released (4.13.13-1)
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16649
===================================================================
--- active/CVE-2017-16649 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16649 2017-12-09 08:43:22 UTC (rev 5770)
@@ -11,5 +11,5 @@
3.2-upstream-stable: released (3.2.96) [d7d24810ac55e2f3fb213d6acf80016a0d337c50]
sid: released (4.13.13-1) [bugfix/all/net-cdc_ether-fix-divide-by-0-on-bad-descriptors.patch]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
Modified: active/CVE-2017-16650
===================================================================
--- active/CVE-2017-16650 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-16650 2017-12-09 08:43:22 UTC (rev 5770)
@@ -11,5 +11,5 @@
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.13.13-1) [bugfix/all/net-qmi_wwan-fix-divide-by-0-on-bad-descriptors.patch]
4.9-stretch-security: needed
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-8831
===================================================================
--- active/CVE-2017-8831 2017-12-09 08:43:15 UTC (rev 5769)
+++ active/CVE-2017-8831 2017-12-09 08:43:22 UTC (rev 5770)
@@ -11,5 +11,5 @@
3.2-upstream-stable: released (3.2.94) [10c59d27363eba9fece1965293f83d865ba532be]
sid: released (4.12.6-1)
4.9-stretch-security: released (4.9.47-1)
-3.16-jessie-security: needed
+3.16-jessie-security: released (3.16.51-1)
3.2-wheezy-security: pending (3.2.96-1)
More information about the kernel-sec-discuss
mailing list