[kernel-sec-discuss] r5342 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Tue Jun 6 08:59:18 UTC 2017


Author: carnil
Date: 2017-06-06 08:59:18 +0000 (Tue, 06 Jun 2017)
New Revision: 5342

Modified:
   active/CVE-2016-2188
   active/CVE-2016-9604
   active/CVE-2017-0605
   active/CVE-2017-2671
   active/CVE-2017-7184
   active/CVE-2017-7261
   active/CVE-2017-7294
   active/CVE-2017-7308
   active/CVE-2017-7472
   active/CVE-2017-7487
   active/CVE-2017-7616
   active/CVE-2017-7618
   active/CVE-2017-7645
   active/CVE-2017-7895
   active/CVE-2017-8890
   active/CVE-2017-8924
   active/CVE-2017-8925
   active/CVE-2017-9074
   active/CVE-2017-9075
   active/CVE-2017-9076
   active/CVE-2017-9077
   active/CVE-2017-9242
Log:
Mark 3.2.89 as released

Modified: active/CVE-2016-2188
===================================================================
--- active/CVE-2016-2188	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2016-2188	2017-06-06 08:59:18 UTC (rev 5342)
@@ -17,7 +17,7 @@
 upstream: released (4.11-rc2) [b7321e81fc369abe353cf094d4f0dc2fe11ab95f]
 4.9-upstream-stable: released (4.9.16) [653418adaf1026a10e0c2e4e29b7319610117b33]
 3.16-upstream-stable: pending (3.16.44) [usb-iowarrior-fix-null-deref-at-probe.patch]
-3.2-upstream-stable: pending (3.2.89) [usb-iowarrior-fix-null-deref-at-probe.patch]
+3.2-upstream-stable: released (3.2.89) [usb-iowarrior-fix-null-deref-at-probe.patch]
 sid: released (4.9.16-1)
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/usb-iowarrior-fix-null-deref-at-probe.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/usb-iowarrior-fix-null-deref-at-probe.patch]

Modified: active/CVE-2016-9604
===================================================================
--- active/CVE-2016-9604	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2016-9604	2017-06-06 08:59:18 UTC (rev 5342)
@@ -9,7 +9,7 @@
 upstream: released (4.11-rc8) [ee8f844e3c5a73b999edf733df1c529d6503ec2f]
 4.9-upstream-stable: released (4.9.25) [a5c6e0a76817a3751f58d761aaff7c0b0c4001ff]
 3.16-upstream-stable: pending (3.16.44) [keys-disallow-keyrings-beginning-with-.-to-be-joined-as-session-keyrings.patch]
-3.2-upstream-stable: pending (3.2.89) [keys-disallow-keyrings-beginning-with-.-to-be-joined-as-session-keyrings.patch]
+3.2-upstream-stable: released (3.2.89) [keys-disallow-keyrings-beginning-with-.-to-be-joined-as-session-keyrings.patch]
 sid: released (4.9.25-1)
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/keys-disallow-keyrings-beginning-with-.-to-be-joined.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/keys-disallow-keyrings-beginning-with-.-to-be-joined.patch]

Modified: active/CVE-2017-0605
===================================================================
--- active/CVE-2017-0605	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-0605	2017-06-06 08:59:18 UTC (rev 5342)
@@ -18,7 +18,7 @@
 upstream: released (4.12-rc1) [e09e28671cda63e6308b31798b997639120e2a21]
 4.9-upstream-stable: needed
 3.16-upstream-stable: pending (3.16.44) [tracing-use-strlcpy-instead-of-strcpy-in-__trace_find_cmdline.patch]
-3.2-upstream-stable: pending (3.2.89) [tracing-use-strlcpy-instead-of-strcpy-in-__trace_find_cmdline.patch]
+3.2-upstream-stable: released (3.2.89) [tracing-use-strlcpy-instead-of-strcpy-in-__trace_find_cmdline.patch]
 sid: released (4.9.30-1) [bugfix/all/tracing-Use-strlcpy-instead-of-strcpy-in-__trace_fin.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/tracing-Use-strlcpy-instead-of-strcpy-in-__trace_fin.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/tracing-Use-strlcpy-instead-of-strcpy-in-__trace_fin.patch]

Modified: active/CVE-2017-2671
===================================================================
--- active/CVE-2017-2671	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-2671	2017-06-06 08:59:18 UTC (rev 5342)
@@ -8,7 +8,7 @@
 upstream: released (4.11-rc6) [43a6684519ab0a6c52024b5e25322476cabad893]
 4.9-upstream-stable: released (4.9.26) [e88a8e0a23c23e09858a4f5caeb106da972e7934]
 3.16-upstream-stable: pending (3.16.44) [ping-implement-proper-locking.patch]
-3.2-upstream-stable: pending (3.2.89) [ping-implement-proper-locking.patch]
+3.2-upstream-stable: released (3.2.89) [ping-implement-proper-locking.patch]
 sid: released (4.9.25-1) [bugfix/all/ping-implement-proper-locking.patch]
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/ping-implement-proper-locking.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/ping-implement-proper-locking.patch]

Modified: active/CVE-2017-7184
===================================================================
--- active/CVE-2017-7184	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-7184	2017-06-06 08:59:18 UTC (rev 5342)
@@ -9,7 +9,7 @@
 upstream: released (4.11-rc5) [677e806da4d916052585301785d847c3b3e6186a, f843ee6dd019bcece3e74e76ad9df0155655d0df]
 4.9-upstream-stable: released (4.9.20) [64a5465799ee40e3d54d9da3037934cd4b7b502f, 79191ea36dc9be10a9c9b03d6b341ed2d2f76045]
 3.16-upstream-stable: pending (3.16.44) [xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
-3.2-upstream-stable: pending (3.2.89) [xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
+3.2-upstream-stable: released (3.2.89) [xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
 sid: released (4.9.18-1) [bugfix/all/xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, bugfix/all/xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, bugfix/all/xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, bugfix/all/xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]

Modified: active/CVE-2017-7261
===================================================================
--- active/CVE-2017-7261	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-7261	2017-06-06 08:59:18 UTC (rev 5342)
@@ -13,7 +13,7 @@
 upstream: released (4.11-rc6) [36274ab8c596f1240c606bb514da329add2a1bcd]
 4.9-upstream-stable: released (4.9.22) [73ab72517b61ce4b27ceddec47dd5d6edafb556a]
 3.16-upstream-stable: pending (3.16.44) [drm-vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
-3.2-upstream-stable: pending (3.2.89) [drm-vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
+3.2-upstream-stable: released (3.2.89) [drm-vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
 sid: released (4.9.18-1) [bugfix/x86/vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
 3.16-jessie-security: released (3.16.43-1) [bugfix/x86/vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/x86/vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]

Modified: active/CVE-2017-7294
===================================================================
--- active/CVE-2017-7294	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-7294	2017-06-06 08:59:18 UTC (rev 5342)
@@ -7,7 +7,7 @@
 upstream: released (4.11-rc6) [e7e11f99564222d82f0ce84bd521e57d78a6b678]
 4.9-upstream-stable: released (4.9.22) [4ddd24d54fedff301e8f020d7b9f70116383af31]
 3.16-upstream-stable: pending (3.16.44) [drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
-3.2-upstream-stable: pending (3.2.89) [drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
+3.2-upstream-stable: released (3.2.89) [drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
 sid: released (4.9.18-1) [bugfix/x86/drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
 3.16-jessie-security: released (3.16.43-1) [bugfix/x86/drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/x86/drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]

Modified: active/CVE-2017-7308
===================================================================
--- active/CVE-2017-7308	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-7308	2017-06-06 08:59:18 UTC (rev 5342)
@@ -14,7 +14,7 @@
 upstream: released (4.11-rc6) [2b6867c2ce76c596676bec7d2d525af525fdc6e2, 8f8d28e4d6d815a391285e121c3a53a0b6cb9e7b, bcc5364bdcfe131e6379363f089e7b4108d35b70]
 4.9-upstream-stable: released (4.9.26) [16fc98c2479f5477f2df220acd9cb53686e33f4c, 10452124bac39411e92fc8910dd418648bbb78ac, 1f49c8cd2c9a53ea04bd86bce01247415d12aa26]
 3.16-upstream-stable: pending (3.16.44) [net-packet-fix-overflow-in-check-for-priv-area-size.patch, net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, net-packet-fix-overflow-in-check-for-tp_reserve.patch]
-3.2-upstream-stable: pending (3.2.89) [net-packet-fix-overflow-in-check-for-priv-area-size.patch, net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, net-packet-fix-overflow-in-check-for-tp_reserve.patch]
+3.2-upstream-stable: released (3.2.89) [net-packet-fix-overflow-in-check-for-priv-area-size.patch, net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, net-packet-fix-overflow-in-check-for-tp_reserve.patch]
 sid: released (4.9.18-1) [bugfix/all/net-packet-fix-overflow-in-check-for-priv-area-size.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_reserve.patch]
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/net-packet-fix-overflow-in-check-for-priv-area-size.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_reserve.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/net-packet-fix-overflow-in-check-for-priv-area-size.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_reserve.patch]

Modified: active/CVE-2017-7472
===================================================================
--- active/CVE-2017-7472	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-7472	2017-06-06 08:59:18 UTC (rev 5342)
@@ -10,7 +10,7 @@
 upstream: released (4.11-rc8) [c9f838d104fed6f2f61d68164712e3204bf5271b]
 4.9-upstream-stable: released (4.9.25) [174a74dbca2ddc7269c265598399c000e5b9b870]
 3.16-upstream-stable: pending (3.16.44) [keys-fix-keyctl_set_reqkey_keyring-to-not-leak-thread-keyrings.patch]
-3.2-upstream-stable: pending (3.2.89) [keys-fix-keyctl_set_reqkey_keyring-to-not-leak-thread-keyrings.patch]
+3.2-upstream-stable: released (3.2.89) [keys-fix-keyctl_set_reqkey_keyring-to-not-leak-thread-keyrings.patch]
 sid: released (4.9.25-1)
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/keys-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/keys-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch]

Modified: active/CVE-2017-7487
===================================================================
--- active/CVE-2017-7487	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-7487	2017-06-06 08:59:18 UTC (rev 5342)
@@ -5,7 +5,7 @@
 upstream: released (4.12-rc1) [ee0d8d8482345ff97a75a7d747efc309f13b0d80]
 4.9-upstream-stable: released (4.9.30) [820adccd0e3be9bdd2384ca8fc4712108cfdf28b]
 3.16-upstream-stable: pending (3.16.44) [ipx-call-ipxitf_put-in-ioctl-error-path.patch]
-3.2-upstream-stable: pending (3.2.89) [ipx-call-ipxitf_put-in-ioctl-error-path.patch]
+3.2-upstream-stable: released (3.2.89) [ipx-call-ipxitf_put-in-ioctl-error-path.patch]
 sid: released (4.9.30-1)
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipx-call-ipxitf_put-in-ioctl-error-path.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/ipx-call-ipxitf_put-in-ioctl-error-path.patch]

Modified: active/CVE-2017-7616
===================================================================
--- active/CVE-2017-7616	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-7616	2017-06-06 08:59:18 UTC (rev 5342)
@@ -10,7 +10,7 @@
 upstream: released (4.11-rc6) [cf01fb9985e8deb25ccf0ea54d916b8871ae0e62]
 4.9-upstream-stable: released (4.9.22) [cddab768d13469d1e254fb8c0e1629f93c8dfaca]
 3.16-upstream-stable: pending (3.16.44) [mm-mempolicy.c-fix-error-handling-in-set_mempolicy-and-mbind.patch]
-3.2-upstream-stable: pending (3.2.89) [mm-mempolicy.c-fix-error-handling-in-set_mempolicy-and-mbind.patch]
+3.2-upstream-stable: released (3.2.89) [mm-mempolicy.c-fix-error-handling-in-set_mempolicy-and-mbind.patch]
 sid: released (4.9.25-1)
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/mm-mempolicy.c-fix-error-handling-in-set_mempolicy-a.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/mm-mempolicy.c-fix-error-handling-in-set_mempolicy-a.patch]

Modified: active/CVE-2017-7618
===================================================================
--- active/CVE-2017-7618	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-7618	2017-06-06 08:59:18 UTC (rev 5342)
@@ -11,7 +11,7 @@
 upstream: released (4.11-rc8) [ef0579b64e93188710d48667cb5e014926af9f1b]
 4.9-upstream-stable: released (4.9.24) [c10479591869177ae7ac0570b54ace6fbdeb57c2]
 3.16-upstream-stable: pending (3.16.44) [crypto-ahash-fix-einprogress-notification-callback.patch]
-3.2-upstream-stable: pending (3.2.89) [crypto-ahash-fix-einprogress-notification-callback.patch]
+3.2-upstream-stable: released (3.2.89) [crypto-ahash-fix-einprogress-notification-callback.patch]
 sid: released (4.9.25-1)
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/crypto-ahash-fix-einprogress-notification-callback.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/crypto-ahash-fix-einprogress-notification-callback.patch]

Modified: active/CVE-2017-7645
===================================================================
--- active/CVE-2017-7645	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-7645	2017-06-06 08:59:18 UTC (rev 5342)
@@ -18,7 +18,7 @@
 upstream: released (4.11) [e6838a29ecb484c97e4efef9429643b9851fba6e]
 4.9-upstream-stable: released (4.9.26) [fc6445df466f37291a70937642068bda78802a5b]
 3.16-upstream-stable: pending (3.16.44) [nfsd-check-for-oversized-nfsv2-v3-arguments.patch]
-3.2-upstream-stable: pending (3.2.89) [nfsd-check-for-oversized-nfsv2-v3-arguments.patch]
+3.2-upstream-stable: released (3.2.89) [nfsd-check-for-oversized-nfsv2-v3-arguments.patch]
 sid: released (4.9.25-1) [bugfix/all/nfsd-check-for-oversized-NFSv2-v3-arguments.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/nfsd-check-for-oversized-nfsv2-v3-arguments.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/nfsd-check-for-oversized-nfsv2-v3-arguments.patch]

Modified: active/CVE-2017-7895
===================================================================
--- active/CVE-2017-7895	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-7895	2017-06-06 08:59:18 UTC (rev 5342)
@@ -7,7 +7,7 @@
 upstream: released (4.11) [13bf9fbff0e5e099e2b6f003a0ab8ae145436309]
 4.9-upstream-stable: released (4.9.26) [d7809b9e99bb75e83bdd13dc70ce27df61faf5de]
 3.16-upstream-stable: pending (3.16.44) [nfsd-stricter-decoding-of-write-like-nfsv2-v3-ops.patch]
-3.2-upstream-stable: pending (3.2.89) [nfsd-stricter-decoding-of-write-like-nfsv2-v3-ops.patch]
+3.2-upstream-stable: released (3.2.89) [nfsd-stricter-decoding-of-write-like-nfsv2-v3-ops.patch]
 sid: released (4.9.25-1) [bugfix/all/nfsd-stricter-decoding-of-write-like-NFSv2-v3-ops.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/nfsd-stricter-decoding-of-write-like-nfsv2-v3-ops.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/nfsd-stricter-decoding-of-write-like-nfsv2-v3-ops.patch]

Modified: active/CVE-2017-8890
===================================================================
--- active/CVE-2017-8890	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-8890	2017-06-06 08:59:18 UTC (rev 5342)
@@ -7,7 +7,7 @@
 upstream: released (4.12-rc1) [657831ffc38e30092a2d5f03d385d710eb88b09a]
 4.9-upstream-stable: pending (4.9.31) [dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
 3.16-upstream-stable: pending (3.16.44) [dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
-3.2-upstream-stable: pending (3.2.89) [dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
+3.2-upstream-stable: released (3.2.89) [dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
 sid: released (4.9.30-1) [bugfix/all/dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/dccp-tcp-do-not-inherit-mc_list-from-parent.patch]

Modified: active/CVE-2017-8924
===================================================================
--- active/CVE-2017-8924	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-8924	2017-06-06 08:59:18 UTC (rev 5342)
@@ -5,7 +5,7 @@
 upstream: released (4.11-rc2) [654b404f2a222f918af9b0cd18ad469d0c941a8e]
 4.9-upstream-stable: released (4.9.16) [d0ef6ecee85e17742d8bce1559872cb542d6ccac]
 3.16-upstream-stable: pending (3.16.44) [usb-serial-io_ti-fix-information-leak-in-completion-handler.patch]
-3.2-upstream-stable: pending (3.2.89) [usb-serial-io_ti-fix-information-leak-in-completion-handler.patch]
+3.2-upstream-stable: released (3.2.89) [usb-serial-io_ti-fix-information-leak-in-completion-handler.patch]
 sid: released (4.9.16-1)
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/usb-serial-io_ti-fix-information-leak-in-completion-.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/usb-serial-io_ti-fix-information-leak-in-completion-.patch]

Modified: active/CVE-2017-8925
===================================================================
--- active/CVE-2017-8925	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-8925	2017-06-06 08:59:18 UTC (rev 5342)
@@ -5,7 +5,7 @@
 upstream: released (4.11-rc2) [30572418b445d85fcfe6c8fe84c947d2606767d8]
 4.9-upstream-stable: released (4.9.16) [6d6c5895f45431579c20f4183b25183f0e3afc92]
 3.16-upstream-stable: pending (3.16.44) [usb-serial-omninet-fix-reference-leaks-at-open.patch]
-3.2-upstream-stable: pending (3.2.89) [usb-serial-omninet-fix-reference-leaks-at-open.patch]
+3.2-upstream-stable: released (3.2.89) [usb-serial-omninet-fix-reference-leaks-at-open.patch]
 sid: released (4.9.16-1)
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/usb-serial-omninet-fix-reference-leaks-at-open.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/usb-serial-omninet-fix-reference-leaks-at-open.patch]

Modified: active/CVE-2017-9074
===================================================================
--- active/CVE-2017-9074	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-9074	2017-06-06 08:59:18 UTC (rev 5342)
@@ -9,7 +9,7 @@
 upstream: released (4.12-rc2) [2423496af35d94a87156b063ea5cedffc10a70a1]
 4.9-upstream-stable: pending (4.9.31) [ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
 3.16-upstream-stable: pending (3.16.44) [ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
-3.2-upstream-stable: pending (3.2.89) [ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
+3.2-upstream-stable: released (3.2.89) [ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
 sid: released (4.9.30-1) [bugfix/all/ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/ipv6-prevent-overrun-when-parsing-v6-header-options.patch]

Modified: active/CVE-2017-9075
===================================================================
--- active/CVE-2017-9075	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-9075	2017-06-06 08:59:18 UTC (rev 5342)
@@ -5,7 +5,7 @@
 upstream: released (4.12-rc2) [fdcee2cbb8438702ea1b328fb6e0ac5e9a40c7f8]
 4.9-upstream-stable: pending (4.9.31) [sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
 3.16-upstream-stable: pending (3.16.44) [sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
-3.2-upstream-stable: pending (3.2.89) [sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
+3.2-upstream-stable: released (3.2.89) [sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
 sid: released (4.9.30-1) [bugfix/all/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]

Modified: active/CVE-2017-9076
===================================================================
--- active/CVE-2017-9076	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-9076	2017-06-06 08:59:18 UTC (rev 5342)
@@ -5,7 +5,7 @@
 upstream: released (4.12-rc2) [83eaddab4378db256d00d295bda6ca997cd13a52]
 4.9-upstream-stable: pending (4.9.31) [ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
 3.16-upstream-stable: pending (3.16.44) [ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
-3.2-upstream-stable: pending (3.2.89) [ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
+3.2-upstream-stable: released (3.2.89) [ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
 sid: released (4.9.30-1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]

Modified: active/CVE-2017-9077
===================================================================
--- active/CVE-2017-9077	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-9077	2017-06-06 08:59:18 UTC (rev 5342)
@@ -5,7 +5,7 @@
 upstream: released (4.12-rc2) [83eaddab4378db256d00d295bda6ca997cd13a52]
 4.9-upstream-stable: pending (4.9.31) [ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
 3.16-upstream-stable: pending (3.16.44) [ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
-3.2-upstream-stable: pending (3.2.89) [ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
+3.2-upstream-stable: released (3.2.89) [ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
 sid: released (4.9.30-1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]

Modified: active/CVE-2017-9242
===================================================================
--- active/CVE-2017-9242	2017-06-04 12:30:33 UTC (rev 5341)
+++ active/CVE-2017-9242	2017-06-06 08:59:18 UTC (rev 5342)
@@ -5,7 +5,7 @@
 upstream: released (4.12-rc3) [232cd35d0804cc241eb887bb8d4d9b3b9881c64a]
 4.9-upstream-stable: pending (4.9.31) [ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
 3.16-upstream-stable: pending (3.16.44) [ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
-3.2-upstream-stable: pending (3.2.89) [ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
+3.2-upstream-stable: released (3.2.89) [ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
 sid: released (4.9.30-1) [bugfix/all/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]




More information about the kernel-sec-discuss mailing list