[kernel-sec-discuss] r5547 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Fri Sep 15 18:29:52 UTC 2017
Author: carnil
Date: 2017-09-15 18:29:52 +0000 (Fri, 15 Sep 2017)
New Revision: 5547
Modified:
active/CVE-2017-11600
active/CVE-2017-12134
active/CVE-2017-14106
active/CVE-2017-14140
active/CVE-2017-7541
Log:
Update upstream commits for fixes includedin 3.16.48 and 3.2.93
Modified: active/CVE-2017-11600
===================================================================
--- active/CVE-2017-11600 2017-09-15 18:23:25 UTC (rev 5546)
+++ active/CVE-2017-11600 2017-09-15 18:29:52 UTC (rev 5547)
@@ -10,8 +10,8 @@
Bugs:
upstream: released (4.13) [7bab09631c2a303f87a7eb7e3d69e888673b9b7e]
4.9-upstream-stable: released (4.9.48) [12a70ccaa6868163487f9a5ad97e1a91a397b453]
-3.16-upstream-stable: released (3.16.48) [xfrm-policy-check-policy-direction-value.patch]
-3.2-upstream-stable: released (3.2.93) [xfrm-policy-check-policy-direction-value.patch]
+3.16-upstream-stable: released (3.16.48) [60166dc935e2af97cae9432c0247856e2deb0b3f]
+3.2-upstream-stable: released (3.2.93) [31f11713f7bb0a4cb90466331832658c0b9c9e80]
sid: released (4.12.6-1) [bugfix/all/xfrm-policy-check-policy-direction-value.patch]
4.9-stretch-security: pending (4.9.30-2+deb9u4) [bugfix/all/xfrm-policy-check-policy-direction-value.patch]
3.16-jessie-security: pending (3.16.43-2+deb8u4) [bugfix/all/xfrm-policy-check-policy-direction-value.patch]
Modified: active/CVE-2017-12134
===================================================================
--- active/CVE-2017-12134 2017-09-15 18:23:25 UTC (rev 5546)
+++ active/CVE-2017-12134 2017-09-15 18:29:52 UTC (rev 5547)
@@ -5,8 +5,8 @@
Bugs: #866511
upstream: released (4.13-rc6) [462cdace790ac2ed6aad1b19c9c0af0143b6aab0]
4.9-upstream-stable: released (4.9.45) [6c7f3756d072050d612e5c5c04108f90f1985435]
-3.16-upstream-stable: released (3.16.48) [xen-fix-bio-vec-merging.patch]
-3.2-upstream-stable: released (3.2.93) [xen-fix-bio-vec-merging.patch]
+3.16-upstream-stable: released (3.16.48) [f664b0113d2bb8d4bcdf5d03b72eb4c433ded452]
+3.2-upstream-stable: released (3.2.93) [33bab9221e22bab4ddc167f6c49b6ca9c35c2ccf]
sid: released (4.12.12-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
Modified: active/CVE-2017-14106
===================================================================
--- active/CVE-2017-14106 2017-09-15 18:23:25 UTC (rev 5546)
+++ active/CVE-2017-14106 2017-09-15 18:29:52 UTC (rev 5547)
@@ -7,8 +7,8 @@
Bugs:
upstream: released (4.12-rc3) [499350a5a6e7512d9ed369ed63a4244b6536f4f8]
4.9-upstream-stable: needed
-3.16-upstream-stable: released (3.16.48) [tcp-initialize-rcv_mss-to-tcp_min_mss-instead-of-0.patch]
-3.2-upstream-stable: released (3.2.93) [tcp-initialize-rcv_mss-to-tcp_min_mss-instead-of-0.patch]
+3.16-upstream-stable: released (3.16.48) [32cb2d4a59d0512aa825e7f0352f66063482cc07]
+3.2-upstream-stable: released (3.2.93) [16a0303d3f6b222044de5d33c01cbdf590050473]
sid: released (4.12.6-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
Modified: active/CVE-2017-14140
===================================================================
--- active/CVE-2017-14140 2017-09-15 18:23:25 UTC (rev 5546)
+++ active/CVE-2017-14140 2017-09-15 18:29:52 UTC (rev 5547)
@@ -4,8 +4,8 @@
Bugs:
upstream: released (4.13-rc6) [197e7e521384a23b9e585178f3f11c9fa08274b9]
4.9-upstream-stable: released (4.9.45) [61332dc598c3f223678b2d7192ccf3472c544799]
-3.16-upstream-stable: released (3.16.48) [sanitize-move_pages-permission-checks.patch]
-3.2-upstream-stable: released (3.2.93) [sanitize-move_pages-permission-checks.patch]
+3.16-upstream-stable: released (3.16.48) [b5a16892623afec2d3212b963dd688b258002b4b]
+3.2-upstream-stable: released (3.2.93) [a9a659c916c81b3385479ee00d4547912f08abf6]
sid: released (4.12.12-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
Modified: active/CVE-2017-7541
===================================================================
--- active/CVE-2017-7541 2017-09-15 18:23:25 UTC (rev 5546)
+++ active/CVE-2017-7541 2017-09-15 18:29:52 UTC (rev 5547)
@@ -6,7 +6,7 @@
Bugs:
upstream: released (4.13-rc1) [8f44c9a41386729fea410e688959ddaa9d51be7c]
4.9-upstream-stable: released (4.9.39) [414848bba6ab91fe12ca8105b4652c4aa6f4b574]
-3.16-upstream-stable: released (3.16.48) [brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80211_mgmt_tx.patch]
+3.16-upstream-stable: released (3.16.48) [c63048a29cf222bcd75823b4ca898e2aa6311f8f]
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.12.6-1)
4.9-stretch-security: released (4.9.30-2+deb9u3) [bugfix/all/brcmfmac-fix-possible-buffer-overflow-in-brcmf_cfg80.patch]
More information about the kernel-sec-discuss
mailing list