[kernel-sec-discuss] r4886 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Fri Jan 27 20:45:34 UTC 2017


Author: carnil
Date: 2017-01-27 20:45:34 +0000 (Fri, 27 Jan 2017)
New Revision: 4886

Modified:
   active/CVE-2016-10153
   active/CVE-2016-8405
   active/CVE-2016-9191
   active/CVE-2017-2583
   active/CVE-2017-2584
   active/CVE-2017-5546
   active/CVE-2017-5547
   active/CVE-2017-5548
   active/CVE-2017-5549
   active/CVE-2017-5550
   active/CVE-2017-5551
   active/CVE-2017-5576
   active/CVE-2017-5577
Log:
Mark 4.9.6-1 as released in sid

Modified: active/CVE-2016-10153
===================================================================
--- active/CVE-2016-10153	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2016-10153	2017-01-27 20:45:34 UTC (rev 4886)
@@ -5,6 +5,6 @@
 upstream: released (4.10-rc1) [a45f795c65b479b4ba107b6ccde29b896d51ee98]
 3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9"
 3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9"
-sid: pending (4.9.6-1)
+sid: released (4.9.6-1)
 3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9"
 3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9"

Modified: active/CVE-2016-8405
===================================================================
--- active/CVE-2016-8405	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2016-8405	2017-01-27 20:45:34 UTC (rev 4886)
@@ -5,6 +5,6 @@
 upstream: pending [2dc705a9930b4806250fbf5a76e55266e59389f2]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
-sid: pending (4.9.6-1) [bugfix/all/fbdev-color-map-coying-bounds-checking.patch]
+sid: released (4.9.6-1) [bugfix/all/fbdev-color-map-coying-bounds-checking.patch]
 3.16-jessie-security: pending
 3.2-wheezy-security: pending

Modified: active/CVE-2016-9191
===================================================================
--- active/CVE-2016-9191	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2016-9191	2017-01-27 20:45:34 UTC (rev 4886)
@@ -7,6 +7,6 @@
 upstream: released (4.10-rc4) [93362fa47fe98b62e4a34ab408c4a418432e7939]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.11-rc1"
-sid: pending (4.9.6-1)
+sid: released (4.9.6-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-2583
===================================================================
--- active/CVE-2017-2583	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2017-2583	2017-01-27 20:45:34 UTC (rev 4886)
@@ -6,6 +6,6 @@
 upstream: released (4.10-rc4) [33ab91103b3415e12457e3104f0e4517ce12d0f3]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.6-rc1 with 79d5b4c3cd809c770d4bf9812635647016c56011"
-sid: pending (4.9.6-1)
+sid: released (4.9.6-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-2584
===================================================================
--- active/CVE-2017-2584	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2017-2584	2017-01-27 20:45:34 UTC (rev 4886)
@@ -10,6 +10,6 @@
 upstream: released (4.10-rc4) [129a72a0d3c8e139a04512325384fe5ac119e74d]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.6-rc1 with 96051572c819194c37a8367624b285be10297eca"
-sid: pending (4.9.6-1)
+sid: released (4.9.6-1)
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-5546
===================================================================
--- active/CVE-2017-5546	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2017-5546	2017-01-27 20:45:34 UTC (rev 4886)
@@ -5,6 +5,6 @@
 upstream: released (4.10-rc4) [c4e490cf148e85ead0d1b1c2caaba833f1d5b29f]
 3.16-upstream-stable: N/A "freelist randomisation introduced in 4.7-rc1 with c7ce4f60ac199fb3521c5fcd64da21cee801ec2b"
 3.2-upstream-stable: N/A "freelist randomisation introduced in 4.7-rc1 with c7ce4f60ac199fb3521c5fcd64da21cee801ec2b"
-sid: pending (4.9.6-1)
+sid: released (4.9.6-1)
 3.16-jessie-security: N/A "freelist randomisation introduced in 4.7"
 3.2-wheezy-security: N/A "freelist randomisation introduced in 4.7"

Modified: active/CVE-2017-5547
===================================================================
--- active/CVE-2017-5547	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2017-5547	2017-01-27 20:45:34 UTC (rev 4886)
@@ -5,6 +5,6 @@
 upstream: released (4.10-rc5) [6d104af38b570d37aa32a5803b04c354f8ed513d]
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.4-rc1 with 6f78193ee9ea5575180d4462f0f7273a22dd5057"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.4-rc1 with 6f78193ee9ea5575180d4462f0f7273a22dd5057"
-sid: pending (4.9.6-1)
+sid: released (4.9.6-1)
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-5548
===================================================================
--- active/CVE-2017-5548	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2017-5548	2017-01-27 20:45:34 UTC (rev 4886)
@@ -5,6 +5,6 @@
 upstream: released (4.10-rc5) [05a974efa4bdf6e2a150e3f27dc6fcf0a9ad5655]
 3.16-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9"
 3.2-upstream-stable: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9"
-sid: pending (4.9.6-1)
+sid: released (4.9.6-1)
 3.16-jessie-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9"
 3.2-wheezy-security: N/A "Vulnerability introduced with the introduction of VMAP_STACK in 4.9"

Modified: active/CVE-2017-5549
===================================================================
--- active/CVE-2017-5549	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2017-5549	2017-01-27 20:45:34 UTC (rev 4886)
@@ -5,6 +5,6 @@
 upstream: released (4.10-rc4) [146cc8a17a3b4996f6805ee5c080e7101277c410]
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.9.6-1)
+sid: released (4.9.6-1)
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-5550
===================================================================
--- active/CVE-2017-5550	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2017-5550	2017-01-27 20:45:34 UTC (rev 4886)
@@ -6,6 +6,6 @@
 upstream: released (4.10-rc4) [b9dc6f65bc5e232d1c05fe34b5daadc7e8bbf1fb]
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.9.6-1)
+sid: released (4.9.6-1)
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-5551
===================================================================
--- active/CVE-2017-5551	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2017-5551	2017-01-27 20:45:34 UTC (rev 4886)
@@ -5,6 +5,6 @@
 upstream: released (4.10-rc4) [497de07d89c1410d76a15bec2bb41f24a2a89f31]
 3.16-upstream-stable:
 3.2-upstream-stable:
-sid: pending (4.9.6-1)
+sid: released (4.9.6-1)
 3.16-jessie-security:
 3.2-wheezy-security:

Modified: active/CVE-2017-5576
===================================================================
--- active/CVE-2017-5576	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2017-5576	2017-01-27 20:45:34 UTC (rev 4886)
@@ -6,6 +6,6 @@
 upstream: needed
 3.16-upstream-stable: N/A "Introduced in 4.5-rc1 with d5b1a78a772f1e31a94f8babfa964152ec5e9aa5"
 3.2-upstream-stable: N/A "Introduced in 4.5-rc1 with d5b1a78a772f1e31a94f8babfa964152ec5e9aa5"
-sid: pending (4.9.6-1) [bugfix/arm/drm-vc4-fix-an-integer-overflow-in-temporary-allocation-layout.patch]
+sid: released (4.9.6-1) [bugfix/arm/drm-vc4-fix-an-integer-overflow-in-temporary-allocation-layout.patch]
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-5577
===================================================================
--- active/CVE-2017-5577	2017-01-26 21:30:07 UTC (rev 4885)
+++ active/CVE-2017-5577	2017-01-27 20:45:34 UTC (rev 4886)
@@ -6,6 +6,6 @@
 upstream: needed
 3.16-upstream-stable: N/A "Introduced in 4.5-rc1 with d5b1a78a772f1e31a94f8babfa964152ec5e9aa5"
 3.2-upstream-stable: N/A "Introduced in 4.5-rc1 with d5b1a78a772f1e31a94f8babfa964152ec5e9aa5"
-sid: pending (4.9.6-1) [bugfix/arm/drm/vc4-return-einval-on-the-overflow-checks-failing.patch]
+sid: released (4.9.6-1) [bugfix/arm/drm/vc4-return-einval-on-the-overflow-checks-failing.patch]
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"




More information about the kernel-sec-discuss mailing list