[kernel-sec-discuss] r5738 - active

Ben Hutchings benh at moszumanska.debian.org
Sun Nov 26 13:55:15 UTC 2017


Author: benh
Date: 2017-11-26 13:55:15 +0000 (Sun, 26 Nov 2017)
New Revision: 5738

Modified:
   active/CVE-2016-10208
   active/CVE-2017-14051
   active/CVE-2017-15115
   active/CVE-2017-16525
   active/CVE-2017-16536
   active/CVE-2017-16537
   active/CVE-2017-16643
   active/CVE-2017-16649
   active/CVE-2017-16650
Log:
Mark 3.2.96 and 3.16.51 as released

Modified: active/CVE-2016-10208
===================================================================
--- active/CVE-2016-10208	2017-11-25 08:03:40 UTC (rev 5737)
+++ active/CVE-2016-10208	2017-11-26 13:55:15 UTC (rev 5738)
@@ -12,7 +12,7 @@
 upstream: released (4.10-rc1) [3a4b77cd47bb837b8557595ec7425f281f2ca1fe]
 4.9-upstream-stable: released (4.9.9) [13e6ef99d23b05807e7f8a72f45e3d8260b61570]
 3.16-upstream-stable: released (3.16.41) [cde863587b6809fdf61ea3c5391ecf06884b5516]
-3.2-upstream-stable: pending (3.2.96) [ext4-validate-s_first_meta_bg-at-mount-time.patch]
+3.2-upstream-stable: released (3.2.96) [ext4-validate-s_first_meta_bg-at-mount-time.patch]
 sid: released (4.9.10-1)
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/ext4-validate-s_first_meta_bg-at-mount-time.patch]
 3.2-wheezy-security: needed

Modified: active/CVE-2017-14051
===================================================================
--- active/CVE-2017-14051	2017-11-25 08:03:40 UTC (rev 5737)
+++ active/CVE-2017-14051	2017-11-26 13:55:15 UTC (rev 5738)
@@ -8,8 +8,8 @@
  https://bugzilla.kernel.org/show_bug.cgi?id=194061
 upstream: released (4.14-rc1) [e6f77540c067b48dee10f1e33678415bfcc89017]
 4.9-upstream-stable: released (4.9.52) [2a913aecc4f746ce15eb1bec98b134aff4190ae2]
-3.16-upstream-stable: pending (3.16.51) [scsi-qla2xxx-fix-an-integer-overflow-in-sysfs-code.patch]
-3.2-upstream-stable: pending (3.2.96) [scsi-qla2xxx-fix-an-integer-overflow-in-sysfs-code.patch]
+3.16-upstream-stable: released (3.16.51) [scsi-qla2xxx-fix-an-integer-overflow-in-sysfs-code.patch]
+3.2-upstream-stable: released (3.2.96) [scsi-qla2xxx-fix-an-integer-overflow-in-sysfs-code.patch]
 sid: released (4.12.13-1) [bugfix/all/scsi-qla2xxx-Fix-an-integer-overflow-in-sysfs-code.patch]
 4.9-stretch-security: released (4.9.30-2+deb9u4) [bugfix/all/scsi-qla2xxx-fix-an-integer-overflow-in-sysfs-code.patch]
 3.16-jessie-security: released (3.16.43-2+deb8u4) [bugfix/all/scsi-qla2xxx-fix-an-integer-overflow-in-sysfs-code.patch]

Modified: active/CVE-2017-15115
===================================================================
--- active/CVE-2017-15115	2017-11-25 08:03:40 UTC (rev 5737)
+++ active/CVE-2017-15115	2017-11-26 13:55:15 UTC (rev 5738)
@@ -4,8 +4,8 @@
 Bugs:
 upstream: released (4.14-rc6) [df80cd9b28b9ebaa284a41df611dbf3a2d05ca74]
 4.9-upstream-stable: released (4.9.65) [362d2ce0f851653d2eed87fdb8891ab4cfb0c2bf]
-3.16-upstream-stable: pending (3.16.51) [sctp-do-not-peel-off-an-assoc-from-one-netns-to-another-one.patch]
-3.2-upstream-stable: pending (3.2.96) [sctp-do-not-peel-off-an-assoc-from-one-netns-to-another-one.patch]
+3.16-upstream-stable: released (3.16.51) [sctp-do-not-peel-off-an-assoc-from-one-netns-to-another-one.patch]
+3.2-upstream-stable: released (3.2.96) [sctp-do-not-peel-off-an-assoc-from-one-netns-to-another-one.patch]
 sid: released (4.13.13-1) [bugfix/all/sctp-do-not-peel-off-an-assoc-from-one-netns-to-anot.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16525
===================================================================
--- active/CVE-2017-16525	2017-11-25 08:03:40 UTC (rev 5737)
+++ active/CVE-2017-16525	2017-11-26 13:55:15 UTC (rev 5738)
@@ -9,8 +9,8 @@
 Bugs:
 upstream: released (4.14-rc5) [299d7572e46f98534033a9e65973f13ad1ce9047, bd998c2e0df0469707503023d50d46cf0b10c787]
 4.9-upstream-stable: released (4.9.57) [063b57d556181c796294b1cdf4d649cebc12678a]
-3.16-upstream-stable: pending (3.16.51) [usb-serial-console-fix-use-after-free-after-failed-setup.patch]
-3.2-upstream-stable: pending (3.2.96) [usb-serial-console-fix-use-after-free-after-failed-setup.patch]
+3.16-upstream-stable: released (3.16.51) [usb-serial-console-fix-use-after-free-after-failed-setup.patch]
+3.2-upstream-stable: released (3.2.96) [usb-serial-console-fix-use-after-free-after-failed-setup.patch]
 sid: released (4.13.10-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16536
===================================================================
--- active/CVE-2017-16536	2017-11-25 08:03:40 UTC (rev 5737)
+++ active/CVE-2017-16536	2017-11-26 13:55:15 UTC (rev 5738)
@@ -7,8 +7,8 @@
 Bugs:
 upstream: pending (4.15-rc1) [6c3b047fa2d2286d5e438bcb470c7b1a49f415f6]
 4.9-upstream-stable: needed
-3.16-upstream-stable: pending (3.16.51) [cx231xx-cards-fix-null-deref-on-missing-association.patch]
-3.2-upstream-stable: pending (3.2.96) [cx231xx-cards-fix-null-deref-on-missing-association.patch]
+3.16-upstream-stable: released (3.16.51) [cx231xx-cards-fix-null-deref-on-missing-association.patch]
+3.2-upstream-stable: released (3.2.96) [cx231xx-cards-fix-null-deref-on-missing-association.patch]
 sid: released (4.13.13-1) [bugfix/all/media-cx231xx-cards-fix-null-deref-on-missing-associ.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16537
===================================================================
--- active/CVE-2017-16537	2017-11-25 08:03:40 UTC (rev 5737)
+++ active/CVE-2017-16537	2017-11-26 13:55:15 UTC (rev 5738)
@@ -7,8 +7,8 @@
 Bugs:
 upstream: pending (4.15-rc1) [58fd55e838276a0c13d1dc7c387f90f25063cbf3]
 4.9-upstream-stable: released (4.9.64) [ca98a5c721703de77f7fb8bbafd0673e4a60a841]
-3.16-upstream-stable: pending (3.16.51) [media-imon-fix-null-ptr-deref-in-imon_probe.patch]
-3.2-upstream-stable: pending (3.2.96) [media-imon-fix-null-ptr-deref-in-imon_probe.patch]
+3.16-upstream-stable: released (3.16.51) [media-imon-fix-null-ptr-deref-in-imon_probe.patch]
+3.2-upstream-stable: released (3.2.96) [media-imon-fix-null-ptr-deref-in-imon_probe.patch]
 sid: released (4.13.13-1) [bugfix/all/media-imon-fix-null-ptr-deref-in-imon_probe.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16643
===================================================================
--- active/CVE-2017-16643	2017-11-25 08:03:40 UTC (rev 5737)
+++ active/CVE-2017-16643	2017-11-26 13:55:15 UTC (rev 5738)
@@ -6,8 +6,8 @@
 Bugs:
 upstream: released (4.14-rc7) [a50829479f58416a013a4ccca791336af3c584c7]
 4.9-upstream-stable: released (4.9.60) [52f65e35c2b85908fa66cfc265be4e3fd88744a3]
-3.16-upstream-stable: pending (3.16.51) [input-gtco-fix-potential-out-of-bound-access.patch]
-3.2-upstream-stable: pending (3.2.96) [input-gtco-fix-potential-out-of-bound-access.patch]
+3.16-upstream-stable: released (3.16.51) [input-gtco-fix-potential-out-of-bound-access.patch]
+3.2-upstream-stable: released (3.2.96) [input-gtco-fix-potential-out-of-bound-access.patch]
 sid: released (4.13.13-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16649
===================================================================
--- active/CVE-2017-16649	2017-11-25 08:03:40 UTC (rev 5737)
+++ active/CVE-2017-16649	2017-11-26 13:55:15 UTC (rev 5738)
@@ -7,8 +7,8 @@
 Bugs:
 upstream: released (4.14) [2cb80187ba065d7decad7c6614e35e07aec8a974]
 4.9-upstream-stable: released (4.9.65) [f376621861e3d8a713d6931f4363c4137912330b]
-3.16-upstream-stable: pending (3.16.51) [net-cdc_ether-fix-divide-by-0-on-bad-descriptors.patch]
-3.2-upstream-stable: pending (3.2.96) [net-cdc_ether-fix-divide-by-0-on-bad-descriptors.patch]
+3.16-upstream-stable: released (3.16.51) [net-cdc_ether-fix-divide-by-0-on-bad-descriptors.patch]
+3.2-upstream-stable: released (3.2.96) [net-cdc_ether-fix-divide-by-0-on-bad-descriptors.patch]
 sid: released (4.13.13-1) [bugfix/all/net-cdc_ether-fix-divide-by-0-on-bad-descriptors.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16650
===================================================================
--- active/CVE-2017-16650	2017-11-25 08:03:40 UTC (rev 5737)
+++ active/CVE-2017-16650	2017-11-26 13:55:15 UTC (rev 5738)
@@ -7,7 +7,7 @@
 Bugs:
 upstream: released (4.14) [7fd078337201cf7468f53c3d9ef81ff78cb6df3b]
 4.9-upstream-stable: released (4.9.65) [02a0c0639ae07beab982bbad4527b40da96d33ff]
-3.16-upstream-stable: pending (3.16.51) [net-qmi_wwan-fix-divide-by-0-on-bad-descriptors.patch]
+3.16-upstream-stable: released (3.16.51) [net-qmi_wwan-fix-divide-by-0-on-bad-descriptors.patch]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.13.13-1) [bugfix/all/net-qmi_wwan-fix-divide-by-0-on-bad-descriptors.patch]
 4.9-stretch-security: needed




More information about the kernel-sec-discuss mailing list