Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 17 Aug 2016 17:17:10 +0200
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2016-5696: linux kernel - challange ack
 information leak.

On Wed, Aug 17, 2016 at 05:01:45PM +0200, Gsunde Orangen wrote:
> > > Heh, fair enough.  This fix is now in the kernels that were released
> today
> > > (4.7.1, 4.6.7, 4.4.18, and 3.14.76), hope that helps.
> It seems that Greg keeps on being bothered with questions ;-)
> Here's one more: the relevant Upstream commit
> 75ff39ccc1bd5d3c455b6822ab09e533c551f758
> is referenced in all change logs of yesterday's kernel releases...
> ... Except for: 4.7.1 (https://cdn.kernel.org/pub/
> linux/kernel/v4.x/ChangeLog-4.7.1)
> Did 4.7.1 miss the fix?

No, it was already in 4.7 when it was released:
	$ git describe --contains 75ff39ccc1bd5d3c455b6822ab09e533c551f758
	v4.7~2^2~27

thanks,

greg k-h

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ