[kernel-sec-discuss] r4003 - active

Ben Hutchings benh at moszumanska.debian.org
Mon Nov 16 22:18:51 UTC 2015


Author: benh
Date: 2015-11-16 22:18:51 +0000 (Mon, 16 Nov 2015)
New Revision: 4003

Modified:
   active/CVE-2015-5307
   active/CVE-2015-7799
   active/CVE-2015-7884
   active/CVE-2015-7885
   active/CVE-2015-8104
Log:
Mark issues released in 4.4-rc1

Modified: active/CVE-2015-5307
===================================================================
--- active/CVE-2015-5307	2015-11-16 22:14:05 UTC (rev 4002)
+++ active/CVE-2015-5307	2015-11-16 22:18:51 UTC (rev 4003)
@@ -2,7 +2,7 @@
 References:
 Notes:
 Bugs:
-upstream: pending (4.4-rc1) [54a20552e1eae07aa240fa370a0293e006b5faed]
+upstream: released (4.4-rc1) [54a20552e1eae07aa240fa370a0293e006b5faed]
 3.16-upstream-stable: needed
 3.2-upstream-stable: pending (3.2.73) [kvm-x86-work-around-infinite-loop-in-microcode-when-ac-is.patch]
 2.6.32-upstream-stable: needed

Modified: active/CVE-2015-7799
===================================================================
--- active/CVE-2015-7799	2015-11-16 22:14:05 UTC (rev 4002)
+++ active/CVE-2015-7799	2015-11-16 22:18:51 UTC (rev 4003)
@@ -3,7 +3,7 @@
  https://code.google.com/p/android/issues/detail?id=187973
 Notes:
 Bugs:
-upstream: pending [0baa57d8dc32db78369d8b5176ef56c5e2e18ab3, 4ab42d78e37a294ac7bc56901d563c642e03c4ae]
+upstream: released (4.4-rc1) [0baa57d8dc32db78369d8b5176ef56c5e2e18ab3, 4ab42d78e37a294ac7bc56901d563c642e03c4ae]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed

Modified: active/CVE-2015-7884
===================================================================
--- active/CVE-2015-7884	2015-11-16 22:14:05 UTC (rev 4002)
+++ active/CVE-2015-7884	2015-11-16 22:18:51 UTC (rev 4003)
@@ -3,7 +3,7 @@
  https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/?id=eda98796aff0d9bf41094b06811f5def3b4c333c
 Notes:
 Bugs:
-upstream: pending [eda98796aff0d9bf41094b06811f5def3b4c333c]
+upstream: released (4.4-rc1) [eda98796aff0d9bf41094b06811f5def3b4c333c]
 3.16-upstream-stable: N/A "Vulnerable code introduced in 3.18"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 3.18"
 2.6.32-upstream-stable: N/A "Vulnerable code introduced in 3.18"

Modified: active/CVE-2015-7885
===================================================================
--- active/CVE-2015-7885	2015-11-16 22:14:05 UTC (rev 4002)
+++ active/CVE-2015-7885	2015-11-16 22:18:51 UTC (rev 4003)
@@ -4,7 +4,7 @@
  not yet in linux tree
 Notes:
 Bugs:
-upstream: pending [4b6184336ebb5c8dc1eae7f7ab46ee608a748b05]
+upstream: released (4.4-rc1) [4b6184336ebb5c8dc1eae7f7ab46ee608a748b05]
 3.16-upstream-stable: needed
 3.2-upstream-stable: N/A "Vulnerable code not present"
 2.6.32-upstream-stable: N/A "Vulnerable code not present"

Modified: active/CVE-2015-8104
===================================================================
--- active/CVE-2015-8104	2015-11-16 22:14:05 UTC (rev 4002)
+++ active/CVE-2015-8104	2015-11-16 22:18:51 UTC (rev 4003)
@@ -5,7 +5,7 @@
  https://bugzilla.novell.com/attachment.cgi?id=655406
 Notes:
 Bugs:
-upstream: pending (4.4-rc1) [cbdb967af3d54993f5814f1cee0ed311a055377d]
+upstream: released (4.4-rc1) [cbdb967af3d54993f5814f1cee0ed311a055377d]
 3.16-upstream-stable: needed
 3.2-upstream-stable: needed
 2.6.32-upstream-stable: needed




More information about the kernel-sec-discuss mailing list