[kernel-sec-discuss] r5717 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Mon Nov 13 08:53:01 UTC 2017


Author: carnil
Date: 2017-11-13 08:53:01 +0000 (Mon, 13 Nov 2017)
New Revision: 5717

Modified:
   active/CVE-2017-12190
   active/CVE-2017-13080
   active/CVE-2017-15265
   active/CVE-2017-15299
   active/CVE-2017-15649
   active/CVE-2017-16527
   active/CVE-2017-16529
   active/CVE-2017-16531
   active/CVE-2017-16532
   active/CVE-2017-16533
   active/CVE-2017-16535
Log:
3.2.95 released upstream

Modified: active/CVE-2017-12190
===================================================================
--- active/CVE-2017-12190	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-12190	2017-11-13 08:53:01 UTC (rev 5717)
@@ -13,7 +13,7 @@
 upstream: released (4.14-rc5) [95d78c28b5a85bacbc29b8dba7c04babb9b0d467]
 4.9-upstream-stable: released (4.9.57) [5444d8ab9a1406af9f1bc2f00c26838637542480]
 3.16-upstream-stable: released (3.16.50) [3c885aa3b459aabc5fa04251a5fdd88e29b1de70]
-3.2-upstream-stable: pending (3.2.95) [fix-unbalanced-page-refcounting-in-bio_map_user_iov.patch]
+3.2-upstream-stable: released (3.2.95) [9ff5d8fe36745867da8a028b3ea58629f7546155]
 sid: released (4.13.10-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-13080
===================================================================
--- active/CVE-2017-13080	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-13080	2017-11-13 08:53:01 UTC (rev 5717)
@@ -9,7 +9,7 @@
 upstream: released (4.14-rc6) [fdf7cb4185b60c68e1a75e61691c4afdc15dea0e]
 4.9-upstream-stable: needed
 3.16-upstream-stable: released (3.16.50) [a0a8a11d1630cd648dc1ce86da620b4e240e0315]
-3.2-upstream-stable: pending (3.2.95) [mac80211-accept-key-reinstall-without-changing-anything.patch]
+3.2-upstream-stable: released (3.2.95) [ef810e7c3d2a8fb3bbd23726599c487c30ea747e]
 sid: needed
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-15265
===================================================================
--- active/CVE-2017-15265	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-15265	2017-11-13 08:53:01 UTC (rev 5717)
@@ -12,7 +12,7 @@
 upstream: released (4.14-rc5) [71105998845fb012937332fe2e806d443c09e026]
 4.9-upstream-stable: released (4.9.57) [35b84860667ff081eee56b62f3db2a28ca8a3823]
 3.16-upstream-stable: released (3.16.50) [853c65fe1db498563bdeea5b7e733441db34d330]
-3.2-upstream-stable: pending (3.2.95) [alsa-seq-fix-use-after-free-at-creating-a-port.patch]
+3.2-upstream-stable: released (3.2.95) [c3895a053b2505f9e409e6d6c57dcece714ab486]
 sid: released (4.13.4-2) [bugfix/all/ALSA-seq-Fix-use-after-free-at-creating-a-port.patch]
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-15299
===================================================================
--- active/CVE-2017-15299	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-15299	2017-11-13 08:53:01 UTC (rev 5717)
@@ -16,7 +16,7 @@
 upstream: released (4.14-rc6) [60ff5b2f547af3828aebafd54daded44cfb0807a]
 4.9-upstream-stable: released (4.9.59) [da0c7503c0b886784bf8bcb279c7d71c1e50c438]
 3.16-upstream-stable: released (3.16.50) [24832178de3ab7b6fb42f2730d8d675e3d30adb2]
-3.2-upstream-stable: pending (3.2.95) [keys-don-t-let-add_key-update-an-uninstantiated-key.patch]
+3.2-upstream-stable: released (3.2.95) [57f94e88bb255bf7b7d267c999aefbe4557307c1]
 sid: released (4.13.10-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-15649
===================================================================
--- active/CVE-2017-15649	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-15649	2017-11-13 08:53:01 UTC (rev 5717)
@@ -7,7 +7,7 @@
 upstream: released (4.14-rc2) [008ba2a13f2d04c947adc536d19debb8fe66f110], (4.14-rc4) [4971613c1639d8e5f102c4e797c3bf8f83a5a69e]
 4.9-upstream-stable: released (4.9.55) [6f7cdd4aa0a45f21edf6cb31236cd9d10c0d7992, 0f22167d3321a028c0b6edc2d5b2ab0e37a2ac53]
 3.16-upstream-stable: released (3.16.50) [4839233c04cd9ffb65fa00bdb473cbdac427d45f, 70abad3796f52ed593d5d31bf9f0b5410a522548]
-3.2-upstream-stable: pending (3.2.95) [packet-hold-bind-lock-when-rebinding-to-fanout-hook.patch, packet-in-packet_do_bind-test-fanout-with-bind_lock-held.patch]
+3.2-upstream-stable: released (3.2.95) [b2e1f10f138c6cc03a2f5c940b6c4963b07c7296, ca3d015d39f0357889fa3ef6a88028162de17d7d]
 sid: released (4.13.10-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16527
===================================================================
--- active/CVE-2017-16527	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-16527	2017-11-13 08:53:01 UTC (rev 5717)
@@ -7,7 +7,7 @@
 upstream: released (4.14-rc5) [124751d5e63c823092060074bd0abaae61aaa9c4]
 4.9-upstream-stable: released (4.9.57) [e0c70289a1e334a60b54b54688f18e2ee38396a9]
 3.16-upstream-stable: released (3.16.50) [6a6488e8d231fa1fca2408e59e819f64fecb45f3]
-3.2-upstream-stable: pending (3.2.95) [alsa-usb-audio-kill-stray-urb-at-exiting.patch]
+3.2-upstream-stable: released (3.2.95) [72f4b1c7114c1b34302999d72bc5b16c8c1a1945]
 sid: released (4.13.10-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16529
===================================================================
--- active/CVE-2017-16529	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-16529	2017-11-13 08:53:01 UTC (rev 5717)
@@ -7,7 +7,7 @@
 upstream: released (4.14-rc4) [bfc81a8bc18e3c4ba0cbaa7666ff76be2f998991]
 4.9-upstream-stable: released (4.9.55) [37b6d898388e78d92a13a8ab50c960d507c968d1]
 3.16-upstream-stable: released (3.16.50) [9992800cfd0b367369407d62a4c228c454c5d0e3]
-3.2-upstream-stable: pending (3.2.95) [alsa-usb-audio-check-out-of-bounds-access-by-corrupted-buffer.patch]
+3.2-upstream-stable: released (3.2.95) [8a930044f0b100d6b28a94525e9cf62787b3ec3a]
 sid: released (4.13.10-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16531
===================================================================
--- active/CVE-2017-16531	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-16531	2017-11-13 08:53:01 UTC (rev 5717)
@@ -7,7 +7,7 @@
 upstream: released (4.14-rc4) [bd7a3fe770ebd8391d1c7d072ff88e9e76d063eb]
 4.9-upstream-stable: released (4.9.55) [a6d4ce2e8b653ff7facde0d0051663fa4cf57b78]
 3.16-upstream-stable: released (3.16.50) [cc81fff9d62e32a27b1f16dab1a6172935792ab7]
-3.2-upstream-stable: pending (3.2.95) [usb-fix-out-of-bounds-in-usb_set_configuration.patch]
+3.2-upstream-stable: released (3.2.95) [a0e0a5850211dd09725c819a8915c2cbe9067317]
 sid: released (4.13.10-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16532
===================================================================
--- active/CVE-2017-16532	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-16532	2017-11-13 08:53:01 UTC (rev 5717)
@@ -6,7 +6,7 @@
 upstream: released (4.14-rc5) [7c80f9e4a588f1925b07134bb2e3689335f6c6d8]
 4.9-upstream-stable: needed
 3.16-upstream-stable: released (3.16.50) [824f2a5ccdd9ddfb53418c13f493aa46ae0c2c00]
-3.2-upstream-stable: pending (3.2.95) [usb-usbtest-fix-null-pointer-dereference.patch]
+3.2-upstream-stable: released (3.2.95) [f2a780301ae85dbe704499675832487130b8e267]
 sid: needed
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16533
===================================================================
--- active/CVE-2017-16533	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-16533	2017-11-13 08:53:01 UTC (rev 5717)
@@ -6,7 +6,7 @@
 upstream: released (4.14-rc5) [f043bfc98c193c284e2cd768fefabe18ac2fed9b]
 4.9-upstream-stable: released (4.9.57) [57265cddde308292af881ce634a5378dd4e25900]
 3.16-upstream-stable: released (3.16.50) [8d675aa967d3927ac100f7af48f2a2af8a041d2d]
-3.2-upstream-stable: pending (3.2.95) [hid-usbhid-fix-out-of-bounds-bug.patch]
+3.2-upstream-stable: released (3.2.95) [99de0781e0de7c866f762b931351c2a501c3074f]
 sid: released (4.13.10-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed

Modified: active/CVE-2017-16535
===================================================================
--- active/CVE-2017-16535	2017-11-13 08:43:13 UTC (rev 5716)
+++ active/CVE-2017-16535	2017-11-13 08:53:01 UTC (rev 5717)
@@ -6,7 +6,7 @@
 upstream: released (4.14-c6) [1c0edc3633b56000e18d82fc241e3995ca18a69e]
 4.9-upstream-stable: released (4.9.59) [9d13d3e05be29056eeab610d9ad26b04c9231a04]
 3.16-upstream-stable: released (3.16.50) [6514189e83d470af2f35735038c1b096410ab98d]
-3.2-upstream-stable: pending (3.2.95) [usb-core-fix-out-of-bounds-access-bug-in-usb_get_bos_descriptor.patch]
+3.2-upstream-stable: released (3.2.95) [7c27b82fad16d2804c7c8405316a636f57edeabd]
 sid: released (4.13.10-1)
 4.9-stretch-security: needed
 3.16-jessie-security: needed




More information about the kernel-sec-discuss mailing list