[kernel-sec-discuss] r5362 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Wed Jun 14 14:36:56 UTC 2017


Author: carnil
Date: 2017-06-14 14:36:56 +0000 (Wed, 14 Jun 2017)
New Revision: 5362

Modified:
   active/CVE-2013-7445
   active/CVE-2014-9940
   active/CVE-2015-8553
   active/CVE-2015-8709
   active/CVE-2015-8839
   active/CVE-2016-8660
   active/CVE-2017-0605
   active/CVE-2017-1000363
   active/CVE-2017-7346
   active/CVE-2017-7487
   active/CVE-2017-7645
   active/CVE-2017-7889
   active/CVE-2017-7895
   active/CVE-2017-8064
   active/CVE-2017-8831
   active/CVE-2017-8890
   active/CVE-2017-8924
   active/CVE-2017-8925
   active/CVE-2017-9059
   active/CVE-2017-9074
   active/CVE-2017-9075
   active/CVE-2017-9076
   active/CVE-2017-9077
   active/CVE-2017-9242
Log:
Add some status for 4.9-stretch-security

Modified: active/CVE-2013-7445
===================================================================
--- active/CVE-2013-7445	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2013-7445	2017-06-14 14:36:56 UTC (rev 5362)
@@ -8,5 +8,6 @@
 3.16-upstream-stable: ignored "Fix is likely to be too big and risky to backport"
 3.2-upstream-stable: ignored "Fix is likely to be too big and risky to backport"
 sid: needed
+4.9-stretch-security: needed
 3.16-jessie-security: ignored "Fix is likely to be too big and risky to backport"
 3.2-wheezy-security: ignored "Fix is likely to be too big and risky to backport"

Modified: active/CVE-2014-9940
===================================================================
--- active/CVE-2014-9940	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2014-9940	2017-06-14 14:36:56 UTC (rev 5362)
@@ -10,5 +10,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.0.2-1)
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2015-8553
===================================================================
--- active/CVE-2015-8553	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2015-8553	2017-06-14 14:36:56 UTC (rev 5362)
@@ -17,5 +17,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: needed
+4.9-stretch-security: needed
 3.16-jessie-security: ignored "breaks qemu as used in jessie"
 3.2-wheezy-security: ignored "breaks qemu as used in jessie"

Modified: active/CVE-2015-8709
===================================================================
--- active/CVE-2015-8709	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2015-8709	2017-06-14 14:36:56 UTC (rev 5362)
@@ -20,5 +20,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.3.3-3) [bugfix/all/ptrace-being-capable-wrt-a-process-requires-mapped-uids-gids.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: released (3.16.7-ckt20-1+deb8u2) [bugfix/all/ptrace-being-capable-wrt-a-process-requires-mapped-uids-gids.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2015-8839
===================================================================
--- active/CVE-2015-8839	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2015-8839	2017-06-14 14:36:56 UTC (rev 5362)
@@ -7,5 +7,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: released (4.5.1-1)
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2016-8660
===================================================================
--- active/CVE-2016-8660	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2016-8660	2017-06-14 14:36:56 UTC (rev 5362)
@@ -10,5 +10,6 @@
 3.16-upstream-stable: N/A "Vulnerable code introduced in (4.4-rc1) [fc0561cefc04e7803c0f6501ca4f310a502f65b8]"
 3.2-upstream-stable: N/A "Vulnerable code introduced in (4.4-rc1) [fc0561cefc04e7803c0f6501ca4f310a502f65b8]"
 sid: needed
+4.9-stretch-security: needed
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-0605
===================================================================
--- active/CVE-2017-0605	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-0605	2017-06-14 14:36:56 UTC (rev 5362)
@@ -20,5 +20,6 @@
 3.16-upstream-stable: released (3.16.44) [a1141b19b23a0605d46f3fab63fd2d76207096c4]
 3.2-upstream-stable: released (3.2.89) [e39e64193a8a611d11d4c62579a7246c1af70d1c]
 sid: released (4.9.30-1) [bugfix/all/tracing-Use-strlcpy-instead-of-strcpy-in-__trace_fin.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/tracing-Use-strlcpy-instead-of-strcpy-in-__trace_fin.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-1000363
===================================================================
--- active/CVE-2017-1000363	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-1000363	2017-06-14 14:36:56 UTC (rev 5362)
@@ -7,5 +7,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: released (4.9.30-1)
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-7346
===================================================================
--- active/CVE-2017-7346	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-7346	2017-06-14 14:36:56 UTC (rev 5362)
@@ -13,5 +13,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: needed
+4.9-stretch-security: needed
 3.16-jessie-security: needed
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-7487
===================================================================
--- active/CVE-2017-7487	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-7487	2017-06-14 14:36:56 UTC (rev 5362)
@@ -7,5 +7,6 @@
 3.16-upstream-stable: released (3.16.44) [c64988b55a19fc5c85f85c433976d6e5210f54dc]
 3.2-upstream-stable: released (3.2.89) [48dc185bcc73e1bb42d007cbaf96ad55cefaf4cb]
 sid: released (4.9.30-1)
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipx-call-ipxitf_put-in-ioctl-error-path.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-7645
===================================================================
--- active/CVE-2017-7645	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-7645	2017-06-14 14:36:56 UTC (rev 5362)
@@ -20,5 +20,6 @@
 3.16-upstream-stable: released (3.16.44) [1d4ab03084d4bace93b1573c57a309e954d05c09]
 3.2-upstream-stable: released (3.2.89) [1eb3e42d91d63fc757a8da38683f417bcdf953a2]
 sid: released (4.9.25-1) [bugfix/all/nfsd-check-for-oversized-NFSv2-v3-arguments.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/nfsd-check-for-oversized-nfsv2-v3-arguments.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-7889
===================================================================
--- active/CVE-2017-7889	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-7889	2017-06-14 14:36:56 UTC (rev 5362)
@@ -12,5 +12,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: released (4.9.25-1)
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-7895
===================================================================
--- active/CVE-2017-7895	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-7895	2017-06-14 14:36:56 UTC (rev 5362)
@@ -9,5 +9,6 @@
 3.16-upstream-stable: released (3.16.44) [bb0ea8af0b69259f5ea1d2fcff52948c98129c5e]
 3.2-upstream-stable: released (3.2.89) [6b9ba0c00cb068a50a409bbdc7cfbe473f1c01a3]
 sid: released (4.9.25-1) [bugfix/all/nfsd-stricter-decoding-of-write-like-NFSv2-v3-ops.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/nfsd-stricter-decoding-of-write-like-nfsv2-v3-ops.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-8064
===================================================================
--- active/CVE-2017-8064	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-8064	2017-06-14 14:36:56 UTC (rev 5362)
@@ -9,5 +9,6 @@
 3.16-upstream-stable: released (3.16.44) [522182342410708c54eb2b33ff36e85f0b045a6d]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.9.25-1)
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/media-dvb-usb-v2-avoid-use-after-free.patch]
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-8831
===================================================================
--- active/CVE-2017-8831	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-8831	2017-06-14 14:36:56 UTC (rev 5362)
@@ -8,5 +8,6 @@
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: needed
+4.9-stretch-security: needed
 3.16-jessie-security: needed
 3.2-wheezy-security: needed

Modified: active/CVE-2017-8890
===================================================================
--- active/CVE-2017-8890	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-8890	2017-06-14 14:36:56 UTC (rev 5362)
@@ -9,5 +9,6 @@
 3.16-upstream-stable: released (3.16.44) [e4d8daa3b0d195c8aead116dd70aad8124be60c3]
 3.2-upstream-stable: released (3.2.89) [3d221359fedfc759661fb4a72804b6e798886e8f]
 sid: released (4.9.30-1) [bugfix/all/dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/dccp-tcp-do-not-inherit-mc_list-from-parent.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-8924
===================================================================
--- active/CVE-2017-8924	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-8924	2017-06-14 14:36:56 UTC (rev 5362)
@@ -7,5 +7,6 @@
 3.16-upstream-stable: released (3.16.44) [f7287278eea268132ab71b30a0425ccf3a13a323]
 3.2-upstream-stable: released (3.2.89) [6d0c587048c85ca94723fc1bd900130cbe875eb3]
 sid: released (4.9.16-1)
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/usb-serial-io_ti-fix-information-leak-in-completion-.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-8925
===================================================================
--- active/CVE-2017-8925	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-8925	2017-06-14 14:36:56 UTC (rev 5362)
@@ -7,5 +7,6 @@
 3.16-upstream-stable: released (3.16.44) [e766215595e90b7a307cc7c7054ff43e96340731]
 3.2-upstream-stable: released (3.2.89) [8b236342396140be22ab9b486c412666f161af78]
 sid: released (4.9.16-1)
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/usb-serial-omninet-fix-reference-leaks-at-open.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-9059
===================================================================
--- active/CVE-2017-9059	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-9059	2017-06-14 14:36:56 UTC (rev 5362)
@@ -14,5 +14,6 @@
 3.16-upstream-stable: N/A "Vulnerable code not present"
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.9.30-1) [bugfix/all/sunrpc-refactor-svc_set_num_threads.patch, bugfix/all/nfsv4-fix-callback-server-shutdown.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: N/A "Vulnerable code not present"
 3.2-wheezy-security: N/A "Vulnerable code not present"

Modified: active/CVE-2017-9074
===================================================================
--- active/CVE-2017-9074	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-9074	2017-06-14 14:36:56 UTC (rev 5362)
@@ -11,5 +11,6 @@
 3.16-upstream-stable: released (3.16.44) [3bff722de601acaf593a1ade13fbbee54b688e9b]
 3.2-upstream-stable: released (3.2.89) [ad8a4d9d3f255a783d534a47d4b4ac611bb291d8]
 sid: released (4.9.30-1) [bugfix/all/ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-prevent-overrun-when-parsing-v6-header-options.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-9075
===================================================================
--- active/CVE-2017-9075	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-9075	2017-06-14 14:36:56 UTC (rev 5362)
@@ -7,5 +7,6 @@
 3.16-upstream-stable: released (3.16.44) [60e7579f4b71e2e8b252d2f1b3ef5ffb3b971a4e]
 3.2-upstream-stable: released (3.2.89) [cc1fa7814bdb7ebee2ee79bbce181c0783de9ad5]
 sid: released (4.9.30-1) [bugfix/all/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/sctp-do-not-inherit-ipv6_-mc-ac-fl-_list-from-parent.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-9076
===================================================================
--- active/CVE-2017-9076	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-9076	2017-06-14 14:36:56 UTC (rev 5362)
@@ -7,5 +7,6 @@
 3.16-upstream-stable: released (3.16.44) [53d48f98b800059504da76d12bf0074581aa0fe2]
 3.2-upstream-stable: released (3.2.89) [0767192a2c4ac9145a7e8fb00370963bc145a920]
 sid: released (4.9.30-1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-9077
===================================================================
--- active/CVE-2017-9077	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-9077	2017-06-14 14:36:56 UTC (rev 5362)
@@ -7,5 +7,6 @@
 3.16-upstream-stable: released (3.16.44) [53d48f98b800059504da76d12bf0074581aa0fe2]
 3.2-upstream-stable: released (3.2.89) [0767192a2c4ac9145a7e8fb00370963bc145a920]
 sid: released (4.9.30-1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-dccp-do-not-inherit-ipv6_mc_list-from-parent.patch]
 3.2-wheezy-security: pending (3.2.89-1)

Modified: active/CVE-2017-9242
===================================================================
--- active/CVE-2017-9242	2017-06-14 14:26:39 UTC (rev 5361)
+++ active/CVE-2017-9242	2017-06-14 14:36:56 UTC (rev 5362)
@@ -7,5 +7,6 @@
 3.16-upstream-stable: released (3.16.44) [55c51263ff43e3bf5deb1425f4221696f94db1be]
 3.2-upstream-stable: released (3.2.89) [e5238fca9694d61861096d5fb80685c9f6581555]
 sid: released (4.9.30-1) [bugfix/all/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
+4.9-stretch-security: N/A "Fixed before branching point"
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipv6-fix-out-of-bound-writes-in-__ip6_append_data.patch]
 3.2-wheezy-security: pending (3.2.89-1)




More information about the kernel-sec-discuss mailing list