[kernel-sec-discuss] r5345 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Tue Jun 6 09:25:19 UTC 2017


Author: carnil
Date: 2017-06-06 09:25:19 +0000 (Tue, 06 Jun 2017)
New Revision: 5345

Modified:
   active/CVE-2017-7184
   active/CVE-2017-7261
   active/CVE-2017-7294
   active/CVE-2017-7308
   active/CVE-2017-7472
   active/CVE-2017-7487
Log:
Record more upstream commits

Modified: active/CVE-2017-7184
===================================================================
--- active/CVE-2017-7184	2017-06-06 09:11:07 UTC (rev 5344)
+++ active/CVE-2017-7184	2017-06-06 09:25:19 UTC (rev 5345)
@@ -8,8 +8,8 @@
 Bugs:
 upstream: released (4.11-rc5) [677e806da4d916052585301785d847c3b3e6186a, f843ee6dd019bcece3e74e76ad9df0155655d0df]
 4.9-upstream-stable: released (4.9.20) [64a5465799ee40e3d54d9da3037934cd4b7b502f, 79191ea36dc9be10a9c9b03d6b341ed2d2f76045]
-3.16-upstream-stable: released (3.16.44) [xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
-3.2-upstream-stable: released (3.2.89) [xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
+3.16-upstream-stable: released (3.16.44) [811f5600db1a0a9c4f1abad5017e09f43d7088f3, fda265baa45b630675359db3699bb68350c4b907]
+3.2-upstream-stable: released (3.2.89) [04dba730e9d4798184b4769f74ef14c20f8c6f9a, 4d09fd3505c59374e599a29918ca40059be3d554]
 sid: released (4.9.18-1) [bugfix/all/xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, bugfix/all/xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, bugfix/all/xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/xfrm_user-validate-xfrm_msg_newae-xfrma_replay_esn_val-replay_window.patch, bugfix/all/xfrm_user-validate-xfrm_msg_newae-incoming-esn-size-harder.patch]

Modified: active/CVE-2017-7261
===================================================================
--- active/CVE-2017-7261	2017-06-06 09:11:07 UTC (rev 5344)
+++ active/CVE-2017-7261	2017-06-06 09:25:19 UTC (rev 5345)
@@ -12,8 +12,8 @@
 Bugs:
 upstream: released (4.11-rc6) [36274ab8c596f1240c606bb514da329add2a1bcd]
 4.9-upstream-stable: released (4.9.22) [73ab72517b61ce4b27ceddec47dd5d6edafb556a]
-3.16-upstream-stable: released (3.16.44) [drm-vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
-3.2-upstream-stable: released (3.2.89) [drm-vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
+3.16-upstream-stable: released (3.16.44) [61cabe967321767052498032178d56a1ea03a7bc]
+3.2-upstream-stable: released (3.2.89) [20996e6d81c907b10a5ab57c4172be97cb1a7de1]
 sid: released (4.9.18-1) [bugfix/x86/vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
 3.16-jessie-security: released (3.16.43-1) [bugfix/x86/vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/x86/vmwgfx-null-pointer-dereference-in-vmw_surface_define_ioctl.patch]

Modified: active/CVE-2017-7294
===================================================================
--- active/CVE-2017-7294	2017-06-06 09:11:07 UTC (rev 5344)
+++ active/CVE-2017-7294	2017-06-06 09:25:19 UTC (rev 5345)
@@ -6,8 +6,8 @@
 Bugs:
 upstream: released (4.11-rc6) [e7e11f99564222d82f0ce84bd521e57d78a6b678]
 4.9-upstream-stable: released (4.9.22) [4ddd24d54fedff301e8f020d7b9f70116383af31]
-3.16-upstream-stable: released (3.16.44) [drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
-3.2-upstream-stable: released (3.2.89) [drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
+3.16-upstream-stable: released (3.16.44) [629655f798b92fd309fdde494a3cfb8a37f807ad]
+3.2-upstream-stable: released (3.2.89) [c2e7959f2ea446a417bf2cdb79792575852d17bb]
 sid: released (4.9.18-1) [bugfix/x86/drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
 3.16-jessie-security: released (3.16.43-1) [bugfix/x86/drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/x86/drm-vmwgfx-fix-integer-overflow-in-vmw_surface_define_ioctl.patch]

Modified: active/CVE-2017-7308
===================================================================
--- active/CVE-2017-7308	2017-06-06 09:11:07 UTC (rev 5344)
+++ active/CVE-2017-7308	2017-06-06 09:25:19 UTC (rev 5345)
@@ -13,8 +13,8 @@
 Bugs:
 upstream: released (4.11-rc6) [2b6867c2ce76c596676bec7d2d525af525fdc6e2, 8f8d28e4d6d815a391285e121c3a53a0b6cb9e7b, bcc5364bdcfe131e6379363f089e7b4108d35b70]
 4.9-upstream-stable: released (4.9.26) [16fc98c2479f5477f2df220acd9cb53686e33f4c, 10452124bac39411e92fc8910dd418648bbb78ac, 1f49c8cd2c9a53ea04bd86bce01247415d12aa26]
-3.16-upstream-stable: released (3.16.44) [net-packet-fix-overflow-in-check-for-priv-area-size.patch, net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, net-packet-fix-overflow-in-check-for-tp_reserve.patch]
-3.2-upstream-stable: released (3.2.89) [net-packet-fix-overflow-in-check-for-priv-area-size.patch, net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, net-packet-fix-overflow-in-check-for-tp_reserve.patch]
+3.16-upstream-stable: released (3.16.44) [a481ab4edd87bc2dc6f1fa9029866dd69c86fc5c, a318bc0bcec7f7867f1f1d8cef5ae6f25aa169a7, 7bb3f26487e578c2cb0567196ce93c008967a269]
+3.2-upstream-stable: released (3.2.89) [091a6de006536c50f8a30db60d994a5b083b1c7b, 1634172286550a62d8a0a98cf8bec5cd975fa09c, 96053b293c69c636d8d34fc569ac81fbf1118658]
 sid: released (4.9.18-1) [bugfix/all/net-packet-fix-overflow-in-check-for-priv-area-size.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_reserve.patch]
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/net-packet-fix-overflow-in-check-for-priv-area-size.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_reserve.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/net-packet-fix-overflow-in-check-for-priv-area-size.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_frame_nr.patch, bugfix/all/net-packet-fix-overflow-in-check-for-tp_reserve.patch]

Modified: active/CVE-2017-7472
===================================================================
--- active/CVE-2017-7472	2017-06-06 09:11:07 UTC (rev 5344)
+++ active/CVE-2017-7472	2017-06-06 09:25:19 UTC (rev 5345)
@@ -9,8 +9,8 @@
  https://bugzilla.redhat.com/show_bug.cgi?id=1442086
 upstream: released (4.11-rc8) [c9f838d104fed6f2f61d68164712e3204bf5271b]
 4.9-upstream-stable: released (4.9.25) [174a74dbca2ddc7269c265598399c000e5b9b870]
-3.16-upstream-stable: released (3.16.44) [keys-fix-keyctl_set_reqkey_keyring-to-not-leak-thread-keyrings.patch]
-3.2-upstream-stable: released (3.2.89) [keys-fix-keyctl_set_reqkey_keyring-to-not-leak-thread-keyrings.patch]
+3.16-upstream-stable: released (3.16.44) [f7ce1014bc5e4bb42d6b9f5afb308f59534067ea]
+3.2-upstream-stable: released (3.2.89) [0ebd7208190d2f7b16fee3cea05665e212cebaab]
 sid: released (4.9.25-1)
 3.16-jessie-security: released (3.16.43-1) [bugfix/all/keys-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch]
 3.2-wheezy-security: released (3.2.88-1) [bugfix/all/keys-fix-keyctl_set_reqkey_keyring-to-not-leak-threa.patch]

Modified: active/CVE-2017-7487
===================================================================
--- active/CVE-2017-7487	2017-06-06 09:11:07 UTC (rev 5344)
+++ active/CVE-2017-7487	2017-06-06 09:25:19 UTC (rev 5345)
@@ -4,8 +4,8 @@
 Bugs:
 upstream: released (4.12-rc1) [ee0d8d8482345ff97a75a7d747efc309f13b0d80]
 4.9-upstream-stable: released (4.9.30) [820adccd0e3be9bdd2384ca8fc4712108cfdf28b]
-3.16-upstream-stable: released (3.16.44) [ipx-call-ipxitf_put-in-ioctl-error-path.patch]
-3.2-upstream-stable: released (3.2.89) [ipx-call-ipxitf_put-in-ioctl-error-path.patch]
+3.16-upstream-stable: released (3.16.44) [c64988b55a19fc5c85f85c433976d6e5210f54dc]
+3.2-upstream-stable: released (3.2.89) [48dc185bcc73e1bb42d007cbaf96ad55cefaf4cb]
 sid: released (4.9.30-1)
 3.16-jessie-security: pending (3.16.43-2+deb8u1) [bugfix/all/ipx-call-ipxitf_put-in-ioctl-error-path.patch]
 3.2-wheezy-security: pending (3.2.88-2) [bugfix/all/ipx-call-ipxitf_put-in-ioctl-error-path.patch]




More information about the kernel-sec-discuss mailing list