[kernel-sec-discuss] r5183 - active

Nicholas Luedtke nluedtke-guest at moszumanska.debian.org
Fri Apr 21 15:19:28 UTC 2017


Author: nluedtke-guest
Date: 2017-04-21 15:19:27 +0000 (Fri, 21 Apr 2017)
New Revision: 5183

Modified:
   active/CVE-2017-2596
   active/CVE-2017-6353
   active/CVE-2017-7618
   active/CVE-2017-7889
Log:
Add commits released in 4.9.24

Modified: active/CVE-2017-2596
===================================================================
--- active/CVE-2017-2596	2017-04-20 11:15:31 UTC (rev 5182)
+++ active/CVE-2017-2596	2017-04-21 15:19:27 UTC (rev 5183)
@@ -7,7 +7,7 @@
 Bugs:
  https://bugzilla.redhat.com/show_bug.cgi?id=1417812
 upstream: released (4.11-rc1) [06ce521af9558814b8606c0476c54497cf83a653]
-4.9-upstream-stable: needed
+4.9-upstream-stable: released (4.9.24) [75465e71ec3139b958d06d48dfc85720aed69b6a]
 3.16-upstream-stable: released (3.16.42) [591fc80b6369a886a1d21cacf11f91b455781df3]
 3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.9.13-1) [bugfix/x86/kvm-fix-page-struct-leak-in-handle_vmon.patch]

Modified: active/CVE-2017-6353
===================================================================
--- active/CVE-2017-6353	2017-04-20 11:15:31 UTC (rev 5182)
+++ active/CVE-2017-6353	2017-04-21 15:19:27 UTC (rev 5183)
@@ -9,7 +9,7 @@
  bwh> Introduced by attempted fix for CVE-2017-5986
 Bugs:
 upstream: released (4.11-rc1) [dfcb9f4f99f1e9a49e43398a7bfbf56927544af1]
-4.9-upstream-stable: needed
+4.9-upstream-stable: released (4.9.24) [35b9d61ea910c1ebd4652b32cc7d713f6689b4f4]
 3.16-upstream-stable: released (3.16.42) [sctp-deny-peeloff-operation-on-asocs-with-threads-sleeping-on-it.patch]
 3.2-upstream-stable: released (3.2.87) [sctp-deny-peeloff-operation-on-asocs-with-threads-sleeping-on-it.patch]
 sid: released (4.9.13-1) [bugfix/all/sctp-deny-peeloff-operation-on-asocs-with-threads-sl.patch]

Modified: active/CVE-2017-7618
===================================================================
--- active/CVE-2017-7618	2017-04-20 11:15:31 UTC (rev 5182)
+++ active/CVE-2017-7618	2017-04-21 15:19:27 UTC (rev 5183)
@@ -5,7 +5,7 @@
 Notes:
 Bugs:
 upstream: pending [ef0579b64e93188710d48667cb5e014926af9f1b]
-4.9-upstream-stable: needed
+4.9-upstream-stable: released [c10479591869177ae7ac0570b54ace6fbdeb57c2]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: pending (4.9.22-1) [bugfix/all/crypto-ahash-fix-einprogress-notification-callback.patch]

Modified: active/CVE-2017-7889
===================================================================
--- active/CVE-2017-7889	2017-04-20 11:15:31 UTC (rev 5182)
+++ active/CVE-2017-7889	2017-04-21 15:19:27 UTC (rev 5183)
@@ -8,7 +8,7 @@
  bwh> benefit for newer versions with CONFIG_HARDENED_USERCOPY.
 Bugs:
 upstream: released (4.11-rc7) [a4866aa812518ed1a37d8ea0c881dc946409de94]
-4.9-upstream-stable: needed
+4.9-upstream-stable: released [2c0ad235ac77f2fc2eee593bf06822cad772e0e2]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: needed




More information about the kernel-sec-discuss mailing list