[kernel-sec-discuss] r5838 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Mon Dec 25 18:35:50 UTC 2017


Author: carnil
Date: 2017-12-25 18:35:49 +0000 (Mon, 25 Dec 2017)
New Revision: 5838

Modified:
   active/CVE-2017-16995
   active/CVE-2017-17862
   active/CVE-2017-17863
Log:
Update CVEs fixed in 4.9.72 for 4.9-upstream-stable

Modified: active/CVE-2017-16995
===================================================================
--- active/CVE-2017-16995	2017-12-24 15:04:55 UTC (rev 5837)
+++ active/CVE-2017-16995	2017-12-25 18:35:49 UTC (rev 5838)
@@ -7,7 +7,7 @@
  carnil> Intorduced in 4.9-rc1 with 484611357c19f9e19ef742ebef4505a07d243cc9
 Bugs:
 upstream: released (4.15-rc5) [95a762e2c8c942780948091f8f2a4f32fce1ac6f]
-4.9-upstream-stable: needed
+4.9-upstream-stable: released (4.9.72) [3695b3b18519099224efbc5875569d2cb6da256d]
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.9-rc1"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.9-rc1"
 sid: released (4.14.7-1) [bugfix/all/bpf-fix-incorrect-sign-extension-in-check_alu_op.patch]

Modified: active/CVE-2017-17862
===================================================================
--- active/CVE-2017-17862	2017-12-24 15:04:55 UTC (rev 5837)
+++ active/CVE-2017-17862	2017-12-25 18:35:49 UTC (rev 5838)
@@ -5,7 +5,7 @@
  carnil> Introduced by 17a5267067f3c372fec9ffb798d6eaba6b5e6a4c in 3.18-rc1
 Bugs:
 upstream: released (4.15-rc1) [c131187db2d3fa2f8bf32fdf4e9a4ef805168467]
-4.9-upstream-stable: needed
+4.9-upstream-stable: released (4.9.72) [7b5b73ea87a06236fa124bdebed1390d362d3439]
 3.16-upstream-stable: N/A "Vulnerable code introduced in 3.18-rc1"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.18-rc1"
 sid: needed

Modified: active/CVE-2017-17863
===================================================================
--- active/CVE-2017-17863	2017-12-24 15:04:55 UTC (rev 5837)
+++ active/CVE-2017-17863	2017-12-25 18:35:49 UTC (rev 5838)
@@ -7,9 +7,10 @@
  carnil> mainline. Quoting commit message: "This is a fix specifically
  carnil> for the v4.9 stable tree because the mainline code looks very
  carnil> different at this point."
+ carnil> The 4.9 specific fix is done via d75d3ee237cee9068022117e059b64bbab617f3d
 Bugs:
 upstream: released (4.15-rc5) [bb7f0f989ca7de1153bd128a40a71709e339fa03]
-4.9-upstream-stable: pending (4.9.72) [bpf-reject-out-of-bounds-stack-pointer-calculation.patch]
+4.9-upstream-stable: released (4.9.72) [d75d3ee237cee9068022117e059b64bbab617f3d]
 3.16-upstream-stable: N/A "Vulnerable code introduced later"
 3.2-upstream-stable: N/A "Vulnerable code introduced later"
 sid: released (4.14.7-1) [bugfix/all/bpf-fix-integer-overflows.patch]




More information about the kernel-sec-discuss mailing list