[kernel-sec-discuss] r5827 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Sat Dec 23 16:48:37 UTC 2017


Author: carnil
Date: 2017-12-23 16:48:37 +0000 (Sat, 23 Dec 2017)
New Revision: 5827

Added:
   active/CVE-2017-17863
Removed:
   active/CVE-bpf-reject-out-of-bounds-stack-pointer-calculation
Log:
CVE-2017-17863 assigned

Copied: active/CVE-2017-17863 (from rev 5826, active/CVE-bpf-reject-out-of-bounds-stack-pointer-calculation)
===================================================================
--- active/CVE-2017-17863	                        (rev 0)
+++ active/CVE-2017-17863	2017-12-23 16:48:37 UTC (rev 5827)
@@ -0,0 +1,18 @@
+Description: bpf: reject out-of-bounds stack pointer calculation
+References:
+ https://www.spinics.net/lists/stable/msg206985.html
+Notes:
+ carnil> Introduced by 7bca0a9702edfc8d0e7e46f984ca422ffdbe0498 (4.9.28)
+ carnil> which is 332270fdc8b6fba07d059a9ad44df9e1a2ad4529 (4.12-rc1) in
+ carnil> mainline. Quoting commit message: "This is a fix specifically
+ carnil> for the v4.9 stable tree because the mainline code looks very
+ carnil>different at this point."
+Bugs:
+upstream:
+4.9-upstream-stable: needed
+3.16-upstream-stable: N/A "Vulnerable code introduced later"
+3.2-upstream-stable: N/A "Vulnerable code introduced later"
+sid:
+4.9-stretch-security: pending (4.9.65-3+deb9u1) [bugfix/all/bpf-reject-out-of-bounds-stack-pointer-calculation.patch]
+3.16-jessie-security: N/A "Vulnerable code introduced later"
+3.2-wheezy-security: N/A "Vulnerable code introduced later"

Deleted: active/CVE-bpf-reject-out-of-bounds-stack-pointer-calculation
===================================================================
--- active/CVE-bpf-reject-out-of-bounds-stack-pointer-calculation	2017-12-23 16:48:36 UTC (rev 5826)
+++ active/CVE-bpf-reject-out-of-bounds-stack-pointer-calculation	2017-12-23 16:48:37 UTC (rev 5827)
@@ -1,18 +0,0 @@
-Description: bpf: reject out-of-bounds stack pointer calculation
-References:
- https://www.spinics.net/lists/stable/msg206985.html
-Notes:
- carnil> Introduced by 7bca0a9702edfc8d0e7e46f984ca422ffdbe0498 (4.9.28)
- carnil> which is 332270fdc8b6fba07d059a9ad44df9e1a2ad4529 (4.12-rc1) in
- carnil> mainline. Quoting commit message: "This is a fix specifically
- carnil> for the v4.9 stable tree because the mainline code looks very
- carnil>different at this point."
-Bugs:
-upstream:
-4.9-upstream-stable: needed
-3.16-upstream-stable: N/A "Vulnerable code introduced later"
-3.2-upstream-stable: N/A "Vulnerable code introduced later"
-sid:
-4.9-stretch-security: pending (4.9.65-3+deb9u1) [bugfix/all/bpf-reject-out-of-bounds-stack-pointer-calculation.patch]
-3.16-jessie-security: N/A "Vulnerable code introduced later"
-3.2-wheezy-security: N/A "Vulnerable code introduced later"




More information about the kernel-sec-discuss mailing list