[kernel-sec-discuss] [Git][kernel-team/kernel-sec][master] Mark 3.2.96-3 as released

Ben Hutchings gitlab at salsa.debian.org
Sun Jan 7 01:45:31 UTC 2018


Ben Hutchings pushed to branch master at Debian kernel team / kernel-sec


Commits:
e9f82634 by Ben Hutchings at 2018-01-07T01:45:12+00:00
Mark 3.2.96-3 as released

- - - - -


6 changed files:

- active/CVE-2017-17558
- active/CVE-2017-17741
- active/CVE-2017-17805
- active/CVE-2017-17806
- active/CVE-2017-17807
- active/CVE-2017-5754


Changes:

=====================================
active/CVE-2017-17558
=====================================
--- a/active/CVE-2017-17558
+++ b/active/CVE-2017-17558
@@ -12,4 +12,4 @@ upstream: released (4.15-rc4) [48a4ff1c7bb5a32d2e396b03132d20d552c0eca7]
 sid: released (4.14.7-1) [bugfix/all/usb-core-prevent-malicious-bnuminterfaces-overflow.patch]
 4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/usb-core-prevent-malicious-bnuminterfaces-overflow.patch]
 3.16-jessie-security: pending (3.16.51-3+deb8u1) [bugfix/all/usb-core-prevent-malicious-bnuminterfaces-overflow.patch]
-3.2-wheezy-security: pending (3.2.96-3) [bugfix/all/usb-core-prevent-malicious-bnuminterfaces-overflow.patch]
+3.2-wheezy-security: released (3.2.96-3) [bugfix/all/usb-core-prevent-malicious-bnuminterfaces-overflow.patch]


=====================================
active/CVE-2017-17741
=====================================
--- a/active/CVE-2017-17741
+++ b/active/CVE-2017-17741
@@ -14,4 +14,4 @@ upstream: released (4.15-rc5) [e39d200fa5bf5b94a0948db0dae44c1b73b84a56]
 sid: released (4.14.7-1) [bugfix/all/kvm-fix-stack-out-of-bounds-read-in-write_mmio.patch]
 4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/kvm-fix-stack-out-of-bounds-read-in-write_mmio.patch]
 3.16-jessie-security: pending (3.16.51-3+deb8u1) [bugfix/all/kvm-fix-stack-out-of-bounds-read-in-write_mmio.patch]
-3.2-wheezy-security: pending (3.2.96-3) [bugfix/x86/kvm-fix-stack-out-of-bounds-read-in-write_mmio.patch]
+3.2-wheezy-security: released (3.2.96-3) [bugfix/x86/kvm-fix-stack-out-of-bounds-read-in-write_mmio.patch]


=====================================
active/CVE-2017-17805
=====================================
--- a/active/CVE-2017-17805
+++ b/active/CVE-2017-17805
@@ -11,4 +11,4 @@ upstream: released (4.15-rc4) [ecaaab5649781c5a0effdaf298a925063020500e]
 sid: released (4.14.7-1) [bugfix/all/crypto-salsa20-fix-blkcipher_walk-API-usage.patch]
 4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/crypto-salsa20-fix-blkcipher_walk-API-usage.patch]
 3.16-jessie-security: pending (3.16.51-3+deb8u1) [bugfix/all/crypto-salsa20-fix-blkcipher_walk-API-usage.patch]
-3.2-wheezy-security: pending (3.2.96-3) [bugfix/all/crypto-salsa20-fix-blkcipher_walk-API-usage.patch]
+3.2-wheezy-security: released (3.2.96-3) [bugfix/all/crypto-salsa20-fix-blkcipher_walk-API-usage.patch]


=====================================
active/CVE-2017-17806
=====================================
--- a/active/CVE-2017-17806
+++ b/active/CVE-2017-17806
@@ -10,4 +10,4 @@ upstream: released (4.15-rc4) [af3ff8045bbf3e32f1a448542e73abb4c8ceb6f1]
 sid: released (4.14.7-1) [bugfix/all/crypto-hmac-require-that-the-underlying-hash-algorit.patch]
 4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/crypto-hmac-require-that-the-underlying-hash-algorit.patch]
 3.16-jessie-security: pending (3.16.51-3+deb8u1) [bugfix/all/crypto-hmac-require-that-the-underlying-hash-algorit.patch]
-3.2-wheezy-security: pending (3.2.96-3) [bugfix/all/crypto-hmac-require-that-the-underlying-hash-algorit.patch]
+3.2-wheezy-security: released (3.2.96-3) [bugfix/all/crypto-hmac-require-that-the-underlying-hash-algorit.patch]


=====================================
active/CVE-2017-17807
=====================================
--- a/active/CVE-2017-17807
+++ b/active/CVE-2017-17807
@@ -10,4 +10,4 @@ upstream: released (4.15-rc3) [4dca6ea1d9432052afb06baf2e3ae78188a4410b]
 sid: released (4.14.7-1)
 4.9-stretch-security: released (4.9.65-3+deb9u1) [bugfix/all/keys-add-missing-permission-check-for-request_key-de.patch]
 3.16-jessie-security: pending (3.16.51-3+deb8u1) [bugfix/all/keys-add-missing-permission-check-for-request_key-de.patch]
-3.2-wheezy-security: pending (3.2.96-3) [bugfix/all/keys-add-missing-permission-check-for-request_key-de.patch]
+3.2-wheezy-security: released (3.2.96-3) [bugfix/all/keys-add-missing-permission-check-for-request_key-de.patch]


=====================================
active/CVE-2017-5754
=====================================
--- a/active/CVE-2017-5754
+++ b/active/CVE-2017-5754
@@ -10,4 +10,4 @@ upstream: released (4.15-rc6)
 sid: released (4.14.12-1)
 4.9-stretch-security: released (4.9.65-3+deb9u2)
 3.16-jessie-security: pending (3.16.51-3+deb8u1)
-3.2-wheezy-security: pending (3.2.96-3)
+3.2-wheezy-security: released (3.2.96-3)



View it on GitLab: https://salsa.debian.org/kernel-team/kernel-sec/commit/e9f82634e077d51e5028dc4d6ca58fa32f8e15dc

---
View it on GitLab: https://salsa.debian.org/kernel-team/kernel-sec/commit/e9f82634e077d51e5028dc4d6ca58fa32f8e15dc
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/kernel-sec-discuss/attachments/20180107/6bf99d77/attachment-0001.html>


More information about the kernel-sec-discuss mailing list