[kernel-sec-discuss] r4962 - active
Ben Hutchings
benh at moszumanska.debian.org
Tue Feb 21 03:09:00 UTC 2017
Author: benh
Date: 2017-02-21 03:09:00 +0000 (Tue, 21 Feb 2017)
New Revision: 4962
Modified:
active/CVE-2016-8405
active/CVE-2016-9191
active/CVE-2017-2583
active/CVE-2017-2584
active/CVE-2017-2618
active/CVE-2017-5549
active/CVE-2017-5551
active/CVE-2017-5897
Log:
Mark issues pending for jessie
Modified: active/CVE-2016-8405
===================================================================
--- active/CVE-2016-8405 2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2016-8405 2017-02-21 03:09:00 UTC (rev 4962)
@@ -7,5 +7,5 @@
3.16-upstream-stable: pending (3.16.40) [fbdev-color-map-copying-bounds-checking.patch]
3.2-upstream-stable: pending (3.2.85) [fbdev-color-map-copying-bounds-checking.patch]
sid: released (4.9.6-1) [bugfix/all/fbdev-color-map-coying-bounds-checking.patch]
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/fbdev-color-map-copying-bounds-checking.patch]
3.2-wheezy-security: needed
Modified: active/CVE-2016-9191
===================================================================
--- active/CVE-2016-9191 2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2016-9191 2017-02-21 03:09:00 UTC (rev 4962)
@@ -9,5 +9,5 @@
3.16-upstream-stable: pending (3.16.40) [sysctl-drop-reference-added-by-grab_header-in-proc_sys_readdir.patch]
3.2-upstream-stable: N/A "Vulnerable code introduced in 3.11-rc1"
sid: released (4.9.6-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/sysctl-drop-reference-added-by-grab_header-in-proc_sys_readdir.patch]
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-2583
===================================================================
--- active/CVE-2017-2583 2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-2583 2017-02-21 03:09:00 UTC (rev 4962)
@@ -8,5 +8,5 @@
3.16-upstream-stable: needed
3.2-upstream-stable: N/A "Vulnerable code introduced in 3.6-rc1 with 79d5b4c3cd809c770d4bf9812635647016c56011"
sid: released (4.9.6-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/x86/kvm-x86-fix-emulation-of-mov-ss-null-selector.patch]
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-2584
===================================================================
--- active/CVE-2017-2584 2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-2584 2017-02-21 03:09:00 UTC (rev 4962)
@@ -12,5 +12,5 @@
3.16-upstream-stable: needed
3.2-upstream-stable: N/A "Vulnerable code introduced in 3.6-rc1 with 96051572c819194c37a8367624b285be10297eca"
sid: released (4.9.6-1)
-3.16-jessie-security: needed
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/x86/kvm-x86-introduce-segmented_write_std.patch]
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2017-2618
===================================================================
--- active/CVE-2017-2618 2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-2618 2017-02-21 03:09:00 UTC (rev 4962)
@@ -5,8 +5,8 @@
Bugs:
upstream: released (4.10-rc8) [0c461cb727d146c9ef2d3e86214f498b78b7d125]
4.9-upstream-stable: released (4.9.10) [6cbaf7b94373743deb42fd410173aab81f8945fe]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
3.2-upstream-stable:
sid: released (4.9.10-1)
-3.16-jessie-security:
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/selinux-fix-off-by-one-in-setprocattr.patch]
3.2-wheezy-security:
Modified: active/CVE-2017-5549
===================================================================
--- active/CVE-2017-5549 2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-5549 2017-02-21 03:09:00 UTC (rev 4962)
@@ -4,8 +4,8 @@
Bugs:
upstream: released (4.10-rc4) [146cc8a17a3b4996f6805ee5c080e7101277c410]
4.9-upstream-stable: released (4.9.5) [58ede4beda662c4e1681fee4fae2174028a1a841]
-3.16-upstream-stable:
-3.2-upstream-stable:
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
sid: released (4.9.6-1)
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/usb-serial-kl5kusb105-fix-line-state-error-handling.patch]
+3.2-wheezy-security: needed
Modified: active/CVE-2017-5551
===================================================================
--- active/CVE-2017-5551 2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-5551 2017-02-21 03:09:00 UTC (rev 4962)
@@ -4,8 +4,8 @@
Bugs:
upstream: released (4.10-rc4) [497de07d89c1410d76a15bec2bb41f24a2a89f31]
4.9-upstream-stable: released (4.9.6) [782b361c93062f083bbc9a78928498218f950399]
-3.16-upstream-stable:
-3.2-upstream-stable:
+3.16-upstream-stable: needed
+3.2-upstream-stable: needed
sid: released (4.9.6-1)
-3.16-jessie-security:
-3.2-wheezy-security:
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/tmpfs-clear-s_isgid-when-setting-posix-acls.patch]
+3.2-wheezy-security: needed
Modified: active/CVE-2017-5897
===================================================================
--- active/CVE-2017-5897 2017-02-20 19:06:11 UTC (rev 4961)
+++ active/CVE-2017-5897 2017-02-21 03:09:00 UTC (rev 4962)
@@ -4,8 +4,8 @@
Bugs:
upstream: released (4.10-rc8) [7892032cfe67f4bde6fc2ee967e45a8fbaf33756]
4.9-upstream-stable: released (4.9.11) [ae1768bbbc469b75662c6714957fe5886cc960c4]
-3.16-upstream-stable:
+3.16-upstream-stable: needed
3.2-upstream-stable: N/A "Vulnerable code introduced in 3.7-rc1 with c12b395a46646bab69089ce7016ac78177f6001f"
sid: pending (4.9.11-1)
-3.16-jessie-security:
+3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/ip6_gre-fix-ip6gre_err-invalid-reads.patch]
3.2-wheezy-security: N/A "Vulnerable code not present"
More information about the kernel-sec-discuss
mailing list