[kernel-sec-discuss] r5532 - active

Ben Hutchings benh at moszumanska.debian.org
Sat Sep 9 06:41:33 UTC 2017


Author: benh
Date: 2017-09-09 06:41:33 +0000 (Sat, 09 Sep 2017)
New Revision: 5532

Modified:
   active/CVE-2017-11600
   active/CVE-2017-12134
   active/CVE-2017-14106
   active/CVE-2017-14140
   active/CVE-2017-7541
Log:
Mark issues pending for 3.16-upstream-stable

Modified: active/CVE-2017-11600
===================================================================
--- active/CVE-2017-11600	2017-09-07 17:08:52 UTC (rev 5531)
+++ active/CVE-2017-11600	2017-09-09 06:41:33 UTC (rev 5532)
@@ -10,7 +10,7 @@
 Bugs:
 upstream: released (4.13) [7bab09631c2a303f87a7eb7e3d69e888673b9b7e]
 4.9-upstream-stable: released (4.9.48) [12a70ccaa6868163487f9a5ad97e1a91a397b453]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.48) [xfrm-policy-check-policy-direction-value.patch]
 3.2-upstream-stable: pending (3.2.93) [xfrm-policy-check-policy-direction-value.patch]
 sid: released (4.12.6-1) [bugfix/all/xfrm-policy-check-policy-direction-value.patch]
 4.9-stretch-security: pending (4.9.30-2+deb9u4) [bugfix/all/xfrm-policy-check-policy-direction-value.patch]

Modified: active/CVE-2017-12134
===================================================================
--- active/CVE-2017-12134	2017-09-07 17:08:52 UTC (rev 5531)
+++ active/CVE-2017-12134	2017-09-09 06:41:33 UTC (rev 5532)
@@ -5,7 +5,7 @@
 Bugs: #866511
 upstream: released (4.13-rc6) [462cdace790ac2ed6aad1b19c9c0af0143b6aab0]
 4.9-upstream-stable: released (4.9.45) [6c7f3756d072050d612e5c5c04108f90f1985435]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.48) [xen-fix-bio-vec-merging.patch]
 3.2-upstream-stable: pending (3.2.93) [xen-fix-bio-vec-merging.patch]
 sid: pending (4.12.10-1)
 4.9-stretch-security: needed

Modified: active/CVE-2017-14106
===================================================================
--- active/CVE-2017-14106	2017-09-07 17:08:52 UTC (rev 5531)
+++ active/CVE-2017-14106	2017-09-09 06:41:33 UTC (rev 5532)
@@ -7,7 +7,7 @@
 Bugs:
 upstream: released (4.12-rc3) [499350a5a6e7512d9ed369ed63a4244b6536f4f8]
 4.9-upstream-stable: needed
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.48) [tcp-initialize-rcv_mss-to-tcp_min_mss-instead-of-0.patch]
 3.2-upstream-stable: pending (3.2.93) [tcp-initialize-rcv_mss-to-tcp_min_mss-instead-of-0.patch]
 sid: released (4.12.6-1)
 4.9-stretch-security: needed

Modified: active/CVE-2017-14140
===================================================================
--- active/CVE-2017-14140	2017-09-07 17:08:52 UTC (rev 5531)
+++ active/CVE-2017-14140	2017-09-09 06:41:33 UTC (rev 5532)
@@ -4,7 +4,7 @@
 Bugs:
 upstream: released (4.13-rc6) [197e7e521384a23b9e585178f3f11c9fa08274b9]
 4.9-upstream-stable: released (4.9.45) [61332dc598c3f223678b2d7192ccf3472c544799]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.48) [sanitize-move_pages-permission-checks.patch]
 3.2-upstream-stable: pending (3.2.93) [sanitize-move_pages-permission-checks.patch]
 sid: pending (4.12.10-1)
 4.9-stretch-security: needed

Modified: active/CVE-2017-7541
===================================================================
--- active/CVE-2017-7541	2017-09-07 17:08:52 UTC (rev 5531)
+++ active/CVE-2017-7541	2017-09-09 06:41:33 UTC (rev 5532)
@@ -6,7 +6,7 @@
 Bugs:
 upstream: released (4.13-rc1) [8f44c9a41386729fea410e688959ddaa9d51be7c]
 4.9-upstream-stable: released (4.9.39) [414848bba6ab91fe12ca8105b4652c4aa6f4b574]
-3.16-upstream-stable: needed
+3.16-upstream-stable: pending (3.16.48) [brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80211_mgmt_tx.patch]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.12.6-1)
 4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80.patch]




More information about the kernel-sec-discuss mailing list