[kernel-sec-discuss] r4962 - active

Ben Hutchings benh at moszumanska.debian.org
Tue Feb 21 03:09:00 UTC 2017


Author: benh
Date: 2017-02-21 03:09:00 +0000 (Tue, 21 Feb 2017)
New Revision: 4962

Modified:
   active/CVE-2016-8405
   active/CVE-2016-9191
   active/CVE-2017-2583
   active/CVE-2017-2584
   active/CVE-2017-2618
   active/CVE-2017-5549
   active/CVE-2017-5551
   active/CVE-2017-5897
Log:
Mark issues pending for jessie

Modified: active/CVE-2016-8405
===================================================================
--- active/CVE-2016-8405	2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2016-8405	2017-02-21 03:09:00 UTC (rev 4962)
@@ -7,5 +7,5 @@
 3.16-upstream-stable: pending (3.16.40) [fbdev-color-map-copying-bounds-checking.patch]
 3.2-upstream-stable: pending (3.2.85) [fbdev-color-map-copying-bounds-checking.patch]
 sid: released (4.9.6-1) [bugfix/all/fbdev-color-map-coying-bounds-checking.patch]
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/fbdev-color-map-copying-bounds-checking.patch]
 3.2-wheezy-security: needed

Modified: active/CVE-2016-9191
===================================================================
--- active/CVE-2016-9191	2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2016-9191	2017-02-21 03:09:00 UTC (rev 4962)
@@ -9,5 +9,5 @@
 3.16-upstream-stable: pending (3.16.40) [sysctl-drop-reference-added-by-grab_header-in-proc_sys_readdir.patch]
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.11-rc1"
 sid: released (4.9.6-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/sysctl-drop-reference-added-by-grab_header-in-proc_sys_readdir.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-2583
===================================================================
--- active/CVE-2017-2583	2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-2583	2017-02-21 03:09:00 UTC (rev 4962)
@@ -8,5 +8,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.6-rc1 with 79d5b4c3cd809c770d4bf9812635647016c56011"
 sid: released (4.9.6-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/x86/kvm-x86-fix-emulation-of-mov-ss-null-selector.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-2584
===================================================================
--- active/CVE-2017-2584	2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-2584	2017-02-21 03:09:00 UTC (rev 4962)
@@ -12,5 +12,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.6-rc1 with 96051572c819194c37a8367624b285be10297eca"
 sid: released (4.9.6-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/x86/kvm-x86-introduce-segmented_write_std.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-2618
===================================================================
--- active/CVE-2017-2618	2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-2618	2017-02-21 03:09:00 UTC (rev 4962)
@@ -5,8 +5,8 @@
 Bugs:
 upstream: released (4.10-rc8) [0c461cb727d146c9ef2d3e86214f498b78b7d125]
 4.9-upstream-stable: released (4.9.10) [6cbaf7b94373743deb42fd410173aab81f8945fe]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
 3.2-upstream-stable:
 sid: released (4.9.10-1)
-3.16-jessie-security:
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/selinux-fix-off-by-one-in-setprocattr.patch]
 3.2-wheezy-security:

Modified: active/CVE-2017-5549
===================================================================
--- active/CVE-2017-5549	2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-5549	2017-02-21 03:09:00 UTC (rev 4962)
@@ -4,8 +4,8 @@
 Bugs:
 upstream: released (4.10-rc4) [146cc8a17a3b4996f6805ee5c080e7101277c410]
 4.9-upstream-stable: released (4.9.5) [58ede4beda662c4e1681fee4fae2174028a1a841]
-3.16-upstream-stable:
-3.2-upstream-stable:
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
 sid: released (4.9.6-1)
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/usb-serial-kl5kusb105-fix-line-state-error-handling.patch]
+3.2-wheezy-security: needed

Modified: active/CVE-2017-5551
===================================================================
--- active/CVE-2017-5551	2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-5551	2017-02-21 03:09:00 UTC (rev 4962)
@@ -4,8 +4,8 @@
 Bugs:
 upstream: released (4.10-rc4) [497de07d89c1410d76a15bec2bb41f24a2a89f31]
 4.9-upstream-stable: released (4.9.6) [782b361c93062f083bbc9a78928498218f950399]
-3.16-upstream-stable:
-3.2-upstream-stable:
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
 sid: released (4.9.6-1)
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/tmpfs-clear-s_isgid-when-setting-posix-acls.patch]
+3.2-wheezy-security: needed

Modified: active/CVE-2017-5897
===================================================================
--- active/CVE-2017-5897	2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-5897	2017-02-21 03:09:00 UTC (rev 4962)
@@ -4,8 +4,8 @@
 Bugs:
 upstream: released (4.10-rc8) [7892032cfe67f4bde6fc2ee967e45a8fbaf33756]
 4.9-upstream-stable: released (4.9.11) [ae1768bbbc469b75662c6714957fe5886cc960c4]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.7-rc1 with c12b395a46646bab69089ce7016ac78177f6001f"
 sid: pending (4.9.11-1)
-3.16-jessie-security:
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/ip6_gre-fix-ip6gre_err-invalid-reads.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"




More information about the kernel-sec-discuss mailing list