On Thu, 24 Nov 2016, David Howells wrote:
> James Morris wrote:
>
> > $ git pull
> > git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
> > keys-fixes-20161124-3
> > fatal: Couldn't find remote ref keys-fixes-20161124-3
>
> Ummm... Weird. I can see the
On Thu, 24 Nov 2016, David Howells wrote:
> James Morris wrote:
>
> > $ git pull
> > git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
> > keys-fixes-20161124-3
> > fatal: Couldn't find remote ref keys-fixes-20161124-3
>
> Ummm... Weird. I can see the tag through the web
James Morris wrote:
> $ git pull
> git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
> keys-fixes-20161124-3
> fatal: Couldn't find remote ref keys-fixes-20161124-3
Ummm... Weird. I can see the tag through the web interface:
James Morris wrote:
> $ git pull
> git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
> keys-fixes-20161124-3
> fatal: Couldn't find remote ref keys-fixes-20161124-3
Ummm... Weird. I can see the tag through the web interface:
On Thu, 24 Nov 2016, David Howells wrote:
> James Morris wrote:
>
> > $ git pull
> > git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
> > keys-fixes-20161124
> > fatal: Couldn't find remote ref keys-fixes-20161124
>
> I've produced two further versions
On Thu, 24 Nov 2016, David Howells wrote:
> James Morris wrote:
>
> > $ git pull
> > git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
> > keys-fixes-20161124
> > fatal: Couldn't find remote ref keys-fixes-20161124
>
> I've produced two further versions of this. Can you
James Morris wrote:
> $ git pull
> git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
> keys-fixes-20161124
> fatal: Couldn't find remote ref keys-fixes-20161124
I've produced two further versions of this. Can you look at
keys-fixes-20161124-3 instead?
James Morris wrote:
> $ git pull
> git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git
> keys-fixes-20161124
> fatal: Couldn't find remote ref keys-fixes-20161124
I've produced two further versions of this. Can you look at
keys-fixes-20161124-3 instead?
David
On Thu, 24 Nov 2016, David Howells wrote:
>
> Hi James,
>
> Can you pull these patches please and pass them on to Linus? They include
> the following:
>
> (1) Fix mpi_powm()'s handling of a number with a zero exponent
> [CVE-2016-8650].
>
> (2) Fix double free in X.509 error handling.
>
On Thu, 24 Nov 2016, David Howells wrote:
>
> Hi James,
>
> Can you pull these patches please and pass them on to Linus? They include
> the following:
>
> (1) Fix mpi_powm()'s handling of a number with a zero exponent
> [CVE-2016-8650].
>
> (2) Fix double free in X.509 error handling.
>
Hi James,
Can you pull these patches please and pass them on to Linus? They include
the following:
(1) Fix mpi_powm()'s handling of a number with a zero exponent [CVE-2016-8650].
(2) Fix double free in X.509 error handling.
Ver #3:
- Integrate my and Andrey's patches for mpi_powm() and
Hi James,
Can you pull these patches please and pass them on to Linus? They include
the following:
(1) Fix mpi_powm()'s handling of a number with a zero exponent [CVE-2016-8650].
(2) Fix double free in X.509 error handling.
Ver #3:
- Integrate my and Andrey's patches for mpi_powm() and
Hi James,
Can you pull these patches please and pass them on to Linus? They include
the following:
(1) Fix mpi_powm()'s handling of a number with a zero exponent [CVE-2016-8650].
(2) Fix double free in X.509 error handling.
Ver #2:
- Use RESIZE_IF_NEEDED() to conditionally resize the
Hi James,
Can you pull these patches please and pass them on to Linus? They include
the following:
(1) Fix mpi_powm()'s handling of a number with a zero exponent [CVE-2016-8650].
(2) Fix double free in X.509 error handling.
Ver #2:
- Use RESIZE_IF_NEEDED() to conditionally resize the
Hi James,
Can you pull these patches please and pass them on to Linus? They include
the following:
(1) Fix mpi_powm()'s handling of a number with a zero exponent [CVE-2016-8650].
(2) Fix double free in X.509 error handling.
The patches can be found here also:
Hi James,
Can you pull these patches please and pass them on to Linus? They include
the following:
(1) Fix mpi_powm()'s handling of a number with a zero exponent [CVE-2016-8650].
(2) Fix double free in X.509 error handling.
The patches can be found here also:
16 matches
Mail list logo