[kernel-sec-discuss] r5265 - active

Nicholas Luedtke nluedtke-guest at moszumanska.debian.org
Wed May 3 17:14:21 UTC 2017


Author: nluedtke-guest
Date: 2017-05-03 17:14:21 +0000 (Wed, 03 May 2017)
New Revision: 5265

Modified:
   active/CVE-2017-2671
   active/CVE-2017-7477
   active/CVE-2017-7645
   active/CVE-2017-7895
Log:
4.9.26 released

Modified: active/CVE-2017-2671
===================================================================
--- active/CVE-2017-2671	2017-05-03 02:24:11 UTC (rev 5264)
+++ active/CVE-2017-2671	2017-05-03 17:14:21 UTC (rev 5265)
@@ -6,7 +6,7 @@
 Notes:
 Bugs:
 upstream: released (4.11-rc6) [43a6684519ab0a6c52024b5e25322476cabad893]
-4.9-upstream-stable: needed
+4.9-upstream-stable: released (4.9.26) [e88a8e0a23c23e09858a4f5caeb106da972e7934]
 3.16-upstream-stable: pending (3.16.44) [ping-implement-proper-locking.patch]
 3.2-upstream-stable: pending (3.2.89) [ping-implement-proper-locking.patch]
 sid: released (4.9.25-1) [bugfix/all/ping-implement-proper-locking.patch]

Modified: active/CVE-2017-7477
===================================================================
--- active/CVE-2017-7477	2017-05-03 02:24:11 UTC (rev 5264)
+++ active/CVE-2017-7477	2017-05-03 17:14:21 UTC (rev 5265)
@@ -2,6 +2,8 @@
 References:
  http://www.openwall.com/lists/oss-security/2017/04/24/5
 Notes:
+ nsl> 4.9.26 contains the first commit with 07389a140f
+ nsl> didn't see the second commit. I assume its needed?
 Bugs:
  https://bugzilla.redhat.com/show_bug.cgi?id=1445207
 upstream: released (4.11) [4d6fa57b4dab0d77f4d8e9d9c73d1e63f6fe8fee, 5294b83086cc1c35b4efeca03644cf9d12282e5b]

Modified: active/CVE-2017-7645
===================================================================
--- active/CVE-2017-7645	2017-05-03 02:24:11 UTC (rev 5264)
+++ active/CVE-2017-7645	2017-05-03 17:14:21 UTC (rev 5265)
@@ -16,7 +16,7 @@
  carnil> CVE: CVE-2017-7895
 Bugs:
 upstream: released (4.11) [e6838a29ecb484c97e4efef9429643b9851fba6e]
-4.9-upstream-stable: needed
+4.9-upstream-stable: released (4.9.26) [fc6445df466f37291a70937642068bda78802a5b]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: released (4.9.25-1) [bugfix/all/nfsd-check-for-oversized-NFSv2-v3-arguments.patch]

Modified: active/CVE-2017-7895
===================================================================
--- active/CVE-2017-7895	2017-05-03 02:24:11 UTC (rev 5264)
+++ active/CVE-2017-7895	2017-05-03 17:14:21 UTC (rev 5265)
@@ -5,7 +5,7 @@
  carnil> NFSv2/v3 write decoding cleanup)
 Bugs:
 upstream: released (4.11) [13bf9fbff0e5e099e2b6f003a0ab8ae145436309]
-4.9-upstream-stable: needed
+4.9-upstream-stable: released (4.9.26) [d7809b9e99bb75e83bdd13dc70ce27df61faf5de]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 sid: released (4.9.25-1) [bugfix/all/nfsd-stricter-decoding-of-write-like-NFSv2-v3-ops.patch]




More information about the kernel-sec-discuss mailing list