[kernel-sec-discuss] r4003 - active
Ben Hutchings
benh at moszumanska.debian.org
Mon Nov 16 22:18:51 UTC 2015
Author: benh
Date: 2015-11-16 22:18:51 +0000 (Mon, 16 Nov 2015)
New Revision: 4003
Modified:
active/CVE-2015-5307
active/CVE-2015-7799
active/CVE-2015-7884
active/CVE-2015-7885
active/CVE-2015-8104
Log:
Mark issues released in 4.4-rc1
Modified: active/CVE-2015-5307
===================================================================
--- active/CVE-2015-5307 2015-11-16 22:14:05 UTC (rev 4002)
+++ active/CVE-2015-5307 2015-11-16 22:18:51 UTC (rev 4003)
@@ -2,7 +2,7 @@
References:
Notes:
Bugs:
-upstream: pending (4.4-rc1) [54a20552e1eae07aa240fa370a0293e006b5faed]
+upstream: released (4.4-rc1) [54a20552e1eae07aa240fa370a0293e006b5faed]
3.16-upstream-stable: needed
3.2-upstream-stable: pending (3.2.73) [kvm-x86-work-around-infinite-loop-in-microcode-when-ac-is.patch]
2.6.32-upstream-stable: needed
Modified: active/CVE-2015-7799
===================================================================
--- active/CVE-2015-7799 2015-11-16 22:14:05 UTC (rev 4002)
+++ active/CVE-2015-7799 2015-11-16 22:18:51 UTC (rev 4003)
@@ -3,7 +3,7 @@
https://code.google.com/p/android/issues/detail?id=187973
Notes:
Bugs:
-upstream: pending [0baa57d8dc32db78369d8b5176ef56c5e2e18ab3, 4ab42d78e37a294ac7bc56901d563c642e03c4ae]
+upstream: released (4.4-rc1) [0baa57d8dc32db78369d8b5176ef56c5e2e18ab3, 4ab42d78e37a294ac7bc56901d563c642e03c4ae]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
2.6.32-upstream-stable: needed
Modified: active/CVE-2015-7884
===================================================================
--- active/CVE-2015-7884 2015-11-16 22:14:05 UTC (rev 4002)
+++ active/CVE-2015-7884 2015-11-16 22:18:51 UTC (rev 4003)
@@ -3,7 +3,7 @@
https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=eda98796aff0d9bf41094b06811f5def3b4c333c
Notes:
Bugs:
-upstream: pending [eda98796aff0d9bf41094b06811f5def3b4c333c]
+upstream: released (4.4-rc1) [eda98796aff0d9bf41094b06811f5def3b4c333c]
3.16-upstream-stable: N/A "Vulnerable code introduced in 3.18"
3.2-upstream-stable: N/A "Vulnerable code introduced in 3.18"
2.6.32-upstream-stable: N/A "Vulnerable code introduced in 3.18"
Modified: active/CVE-2015-7885
===================================================================
--- active/CVE-2015-7885 2015-11-16 22:14:05 UTC (rev 4002)
+++ active/CVE-2015-7885 2015-11-16 22:18:51 UTC (rev 4003)
@@ -4,7 +4,7 @@
not yet in linux tree
Notes:
Bugs:
-upstream: pending [4b6184336ebb5c8dc1eae7f7ab46ee608a748b05]
+upstream: released (4.4-rc1) [4b6184336ebb5c8dc1eae7f7ab46ee608a748b05]
3.16-upstream-stable: needed
3.2-upstream-stable: N/A "Vulnerable code not present"
2.6.32-upstream-stable: N/A "Vulnerable code not present"
Modified: active/CVE-2015-8104
===================================================================
--- active/CVE-2015-8104 2015-11-16 22:14:05 UTC (rev 4002)
+++ active/CVE-2015-8104 2015-11-16 22:18:51 UTC (rev 4003)
@@ -5,7 +5,7 @@
https://bugzilla.novell.com/attachment.cgi?id=655406
Notes:
Bugs:
-upstream: pending (4.4-rc1) [cbdb967af3d54993f5814f1cee0ed311a055377d]
+upstream: released (4.4-rc1) [cbdb967af3d54993f5814f1cee0ed311a055377d]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
2.6.32-upstream-stable: needed
More information about the kernel-sec-discuss
mailing list