[kernel-sec-discuss] r5126 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sat Apr 1 16:51:27 UTC 2017


Author: carnil
Date: 2017-04-01 16:51:27 +0000 (Sat, 01 Apr 2017)
New Revision: 5126

Modified:
   active/CVE-2017-7184
Log:
mark CVE-2017-7184 as released for 4.9-upstream-stable

Modified: active/CVE-2017-7184
===================================================================
--- active/CVE-2017-7184	2017-04-01 11:30:02 UTC (rev 5125)
+++ active/CVE-2017-7184	2017-04-01 16:51:27 UTC (rev 5126)
@@ -7,7 +7,7 @@
  bwh> in a default Debian configuration.
 Bugs:
 upstream: pending [677e806da4d916052585301785d847c3b3e6186a, f843ee6dd019bcece3e74e76ad9df0155655d0df]
-4.9-upstream-stable: needed
+4.9-upstream-stable: released (4.9.20) [64a5465799ee40e3d54d9da3037934cd4b7b502f, 79191ea36dc9be10a9c9b03d6b341ed2d2f76045]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: released (4.9.18-1) [bugfix/all/xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, bugfix/all/xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]




More information about the kernel-sec-discuss mailing list