[kernel-sec-discuss] r5840 - active

Ben Hutchings benh at moszumanska.debian.org
Thu Dec 28 16:58:29 UTC 2017


Author: benh
Date: 2017-12-28 16:58:29 +0000 (Thu, 28 Dec 2017)
New Revision: 5840

Modified:
   active/CVE-2015-8709
   active/CVE-2017-17741
   active/CVE-2017-17805
   active/CVE-2017-17806
   active/CVE-2017-17807
Log:
Mark issues pending for 3.{2,16}-upstream-stable

Modified: active/CVE-2015-8709
===================================================================
--- active/CVE-2015-8709	2017-12-25 18:37:09 UTC (rev 5839)
+++ active/CVE-2015-8709	2017-12-28 16:58:29 UTC (rev 5840)
@@ -17,7 +17,7 @@
 Bugs:
 upstream: released (4.10-rc1) [bfedb589252c01fa505ac9f6f2a3d5d68d707ef4]
 4.9-upstream-stable: released (4.9.1) [694a95fa6dae4991f16cda333d897ea063021fed]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [mm-add-a-user_ns-owner-to-mm_struct-and-fix-ptrace-permission-checks.patch]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.3.3-3) [bugfix/all/ptrace-being-capable-wrt-a-process-requires-mapped-uids-gids.patch]
 4.9-stretch-security: N/A "Fixed before branching point"

Modified: active/CVE-2017-17741
===================================================================
--- active/CVE-2017-17741	2017-12-25 18:37:09 UTC (rev 5839)
+++ active/CVE-2017-17741	2017-12-28 16:58:29 UTC (rev 5840)
@@ -9,8 +9,8 @@
 Bugs:
 upstream: released (4.15-rc5) [e39d200fa5bf5b94a0948db0dae44c1b73b84a56]
 4.9-upstream-stable: needed
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [kvm-fix-stack-out-of-bounds-read-in-write_mmio.patch]
+3.2-upstream-stable: pending (3.2.97) [kvm-fix-stack-out-of-bounds-read-in-write_mmio.patch]
 sid: released (4.14.7-1) [bugfix/all/kvm-fix-stack-out-of-bounds-read-in-write_mmio.patch]
 4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/kvm-fix-stack-out-of-bounds-read-in-write_mmio.patch]
 3.16-jessie-security: needed

Modified: active/CVE-2017-17805
===================================================================
--- active/CVE-2017-17805	2017-12-25 18:37:09 UTC (rev 5839)
+++ active/CVE-2017-17805	2017-12-28 16:58:29 UTC (rev 5840)
@@ -6,8 +6,8 @@
 Bugs:
 upstream: released (4.15-rc4) [ecaaab5649781c5a0effdaf298a925063020500e]
 4.9-upstream-stable: released (4.9.71) [c32e053a11f231376f0899ef906fd43f8fc8dbd0]
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [crypto-salsa20-fix-blkcipher_walk-api-usage.patch]
+3.2-upstream-stable: pending (3.2.97) [crypto-salsa20-fix-blkcipher_walk-api-usage.patch]
 sid: released (4.14.7-1) [bugfix/all/crypto-salsa20-fix-blkcipher_walk-API-usage.patch]
 4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/crypto-salsa20-fix-blkcipher_walk-API-usage.patch]
 3.16-jessie-security: needed

Modified: active/CVE-2017-17806
===================================================================
--- active/CVE-2017-17806	2017-12-25 18:37:09 UTC (rev 5839)
+++ active/CVE-2017-17806	2017-12-28 16:58:29 UTC (rev 5840)
@@ -5,9 +5,9 @@
 Bugs:
 upstream: released (4.15-rc4) [af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1]
 4.9-upstream-stable: released (4.9.71) [43259d07fceb8cc1f5ba7e8003ae19023e0620f5]
-3.16-upstream-stable:
-3.2-upstream-stable:
+3.16-upstream-stable: pending (3.16.52) [crypto-hmac-require-that-the-underlying-hash-algorithm-is-unkeyed.patch]
+3.2-upstream-stable: pending (3.2.97) [crypto-hmac-require-that-the-underlying-hash-algorithm-is-unkeyed.patch]
 sid: released (4.14.7-1) [bugfix/all/crypto-hmac-require-that-the-underlying-hash-algorit.patch]
 4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/crypto-hmac-require-that-the-underlying-hash-algorit.patch]
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: needed
+3.2-wheezy-security: needed

Modified: active/CVE-2017-17807
===================================================================
--- active/CVE-2017-17807	2017-12-25 18:37:09 UTC (rev 5839)
+++ active/CVE-2017-17807	2017-12-28 16:58:29 UTC (rev 5840)
@@ -5,8 +5,8 @@
 Bugs:
 upstream: released (4.15-rc3) [4dca6ea1d9432052afb06baf2e3ae78188a4410b]
 4.9-upstream-stable: released (4.9.69) [982707eb4ff84d4ae21618c02dd8926801b10a07]
-3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.52) [keys-add-missing-permission-check-for-request_key-destination.patch]
+3.2-upstream-stable: pending (3.2.97) [keys-add-missing-permission-check-for-request_key-destination.patch]
 sid: released (4.14.7-1)
 4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/keys-add-missing-permission-check-for-request_key-de.patch]
 3.16-jessie-security: needed




More information about the kernel-sec-discuss mailing list