[kernel-sec-discuss] r4995 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Wed Feb 22 16:22:01 UTC 2017


Author: carnil
Date: 2017-02-22 16:22:01 +0000 (Wed, 22 Feb 2017)
New Revision: 4995

Modified:
   active/CVE-2016-6786
   active/CVE-2016-6787
   active/CVE-2016-8405
   active/CVE-2016-9191
   active/CVE-2017-2583
   active/CVE-2017-2584
   active/CVE-2017-2596
   active/CVE-2017-2618
   active/CVE-2017-5549
   active/CVE-2017-5551
   active/CVE-2017-5897
   active/CVE-2017-5970
   active/CVE-2017-6001
   active/CVE-2017-6074
Log:
mark 3.16.39-1+deb8u1 as released since tagged in git

Modified: active/CVE-2016-6786
===================================================================
--- active/CVE-2016-6786	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2016-6786	2017-02-22 16:22:01 UTC (rev 4995)
@@ -8,5 +8,5 @@
 3.16-upstream-stable: pending (3.16.40) [perf-fix-event-ctx-locking.patch]
 3.2-upstream-stable: pending (3.2.85) [perf-fix-event-ctx-locking.patch]
 sid: released (4.0.2-1)
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/perf-Fix-event-ctx-locking.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/perf-Fix-event-ctx-locking.patch]
 3.2-wheezy-security: released (3.2.84-2) [bugfix/all/perf-fix-event-ctx-locking.patch]

Modified: active/CVE-2016-6787
===================================================================
--- active/CVE-2016-6787	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2016-6787	2017-02-22 16:22:01 UTC (rev 4995)
@@ -8,5 +8,5 @@
 3.16-upstream-stable: pending (3.16.40) [perf-fix-event-ctx-locking.patch]
 3.2-upstream-stable: pending (3.2.85) [perf-fix-event-ctx-locking.patch]
 sid: released (4.0.2-1)
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/perf-Fix-event-ctx-locking.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/perf-Fix-event-ctx-locking.patch]
 3.2-wheezy-security: released (3.2.84-2) [bugfix/all/perf-fix-event-ctx-locking.patch]

Modified: active/CVE-2016-8405
===================================================================
--- active/CVE-2016-8405	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2016-8405	2017-02-22 16:22:01 UTC (rev 4995)
@@ -7,5 +7,5 @@
 3.16-upstream-stable: pending (3.16.40) [fbdev-color-map-copying-bounds-checking.patch]
 3.2-upstream-stable: pending (3.2.85) [fbdev-color-map-copying-bounds-checking.patch]
 sid: released (4.9.6-1) [bugfix/all/fbdev-color-map-coying-bounds-checking.patch]
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/fbdev-color-map-copying-bounds-checking.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/fbdev-color-map-copying-bounds-checking.patch]
 3.2-wheezy-security: released (3.2.84-2) [bugfix/all/fbdev-color-map-copying-bounds-checking.patch]

Modified: active/CVE-2016-9191
===================================================================
--- active/CVE-2016-9191	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2016-9191	2017-02-22 16:22:01 UTC (rev 4995)
@@ -9,5 +9,5 @@
 3.16-upstream-stable: pending (3.16.40) [sysctl-drop-reference-added-by-grab_header-in-proc_sys_readdir.patch]
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.11-rc1"
 sid: released (4.9.6-1)
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/sysctl-drop-reference-added-by-grab_header-in-proc_sys_readdir.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/sysctl-drop-reference-added-by-grab_header-in-proc_sys_readdir.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-2583
===================================================================
--- active/CVE-2017-2583	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2017-2583	2017-02-22 16:22:01 UTC (rev 4995)
@@ -8,5 +8,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.6-rc1 with 79d5b4c3cd809c770d4bf9812635647016c56011"
 sid: released (4.9.6-1)
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/x86/kvm-x86-fix-emulation-of-mov-ss-null-selector.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/x86/kvm-x86-fix-emulation-of-mov-ss-null-selector.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-2584
===================================================================
--- active/CVE-2017-2584	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2017-2584	2017-02-22 16:22:01 UTC (rev 4995)
@@ -12,5 +12,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.6-rc1 with 96051572c819194c37a8367624b285be10297eca"
 sid: released (4.9.6-1)
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/x86/kvm-x86-introduce-segmented_write_std.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/x86/kvm-x86-introduce-segmented_write_std.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-2596
===================================================================
--- active/CVE-2017-2596	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2017-2596	2017-02-22 16:22:01 UTC (rev 4995)
@@ -11,5 +11,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: needed
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/x86/kvm-fix-page-struct-leak-in-handle_vmon.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/x86/kvm-fix-page-struct-leak-in-handle_vmon.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-2618
===================================================================
--- active/CVE-2017-2618	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2017-2618	2017-02-22 16:22:01 UTC (rev 4995)
@@ -16,5 +16,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.9.10-1)
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/selinux-fix-off-by-one-in-setprocattr.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/selinux-fix-off-by-one-in-setprocattr.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-5549
===================================================================
--- active/CVE-2017-5549	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2017-5549	2017-02-22 16:22:01 UTC (rev 4995)
@@ -7,5 +7,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: released (4.9.6-1)
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/usb-serial-kl5kusb105-fix-line-state-error-handling.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/usb-serial-kl5kusb105-fix-line-state-error-handling.patch]
 3.2-wheezy-security: released (3.2.84-2) [bugfix/all/usb-serial-kl5kusb105-fix-line-state-error-handling.patch]

Modified: active/CVE-2017-5551
===================================================================
--- active/CVE-2017-5551	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2017-5551	2017-02-22 16:22:01 UTC (rev 4995)
@@ -7,5 +7,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Backported fix for CVE-2016-7097 already covered this"
 sid: released (4.9.6-1)
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/tmpfs-clear-s_isgid-when-setting-posix-acls.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/tmpfs-clear-s_isgid-when-setting-posix-acls.patch]
 3.2-wheezy-security: N/A "Backported fix for CVE-2016-7097 already covered this"

Modified: active/CVE-2017-5897
===================================================================
--- active/CVE-2017-5897	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2017-5897	2017-02-22 16:22:01 UTC (rev 4995)
@@ -7,5 +7,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.7-rc1 with c12b395a46646bab69089ce7016ac78177f6001f"
 sid: pending (4.9.11-1)
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/ip6_gre-fix-ip6gre_err-invalid-reads.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/ip6_gre-fix-ip6gre_err-invalid-reads.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-5970
===================================================================
--- active/CVE-2017-5970	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2017-5970	2017-02-22 16:22:01 UTC (rev 4995)
@@ -9,5 +9,5 @@
 3.16-upstream-stable:
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.3-rc1 with d826eb14ecef3574b6b3be55e5f4329f4a76fbf3"
 sid: released (4.9.10-1) [bugfix/all/ipv4-keep-skb-dst-around-in-presence-of-IP-options.patch]
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/ipv4-keep-skb-dst-around-in-presence-of-ip-options.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-6001
===================================================================
--- active/CVE-2017-6001	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2017-6001	2017-02-22 16:22:01 UTC (rev 4995)
@@ -9,5 +9,5 @@
 3.16-upstream-stable: pending (3.16.40) [perf-core-fix-concurrent-sys_perf_event_open-vs.-move_group-race.patch]
 3.2-upstream-stable: pending (3.2.85) [perf-core-fix-concurrent-sys_perf_event_open-vs.-move_group-race.patch]
 sid: released (4.9.10-1)
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/perf-core-Fix-concurrent-sys_perf_event_open-vs.-mov.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/perf-core-Fix-concurrent-sys_perf_event_open-vs.-mov.patch]
 3.2-wheezy-security: released (3.2.84-2) [bugfix/all/perf-core-fix-concurrent-sys_perf_event_open-vs.-mov.patch]

Modified: active/CVE-2017-6074
===================================================================
--- active/CVE-2017-6074	2017-02-22 16:21:59 UTC (rev 4994)
+++ active/CVE-2017-6074	2017-02-22 16:22:01 UTC (rev 4995)
@@ -8,5 +8,5 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: pending (4.9.11-1) [bugfix/all/dccp-fix-freeing-skb-too-early-for-IPV6_RECVPKTINFO.patch]
-3.16-jessie-security: pending (3.16.39-1+deb8u1) [bugfix/all/dccp-fix-freeing-skb-too-early-for-IPV6_RECVPKTINFO.patch]
+3.16-jessie-security: released (3.16.39-1+deb8u1) [bugfix/all/dccp-fix-freeing-skb-too-early-for-IPV6_RECVPKTINFO.patch]
 3.2-wheezy-security: released (3.2.84-2) [bugfix/all/dccp-fix-freeing-skb-too-early-for-IPV6_RECVPKTINFO.patch]




More information about the kernel-sec-discuss mailing list