[kernel-sec-discuss] r4169 - active

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed Feb 17 12:25:41 UTC 2016


Author: jmm
Date: 2016-02-17 12:25:41 +0000 (Wed, 17 Feb 2016)
New Revision: 4169

Modified:
   active/CVE-2015-5307
Log:
EOLed for 2.6.32.x


Modified: active/CVE-2015-5307
===================================================================
--- active/CVE-2015-5307	2016-02-16 12:21:17 UTC (rev 4168)
+++ active/CVE-2015-5307	2016-02-17 12:25:41 UTC (rev 4169)
@@ -5,7 +5,7 @@
 upstream: released (4.4-rc1) [54a20552e1eae07aa240fa370a0293e006b5faed]
 3.16-upstream-stable: released (v3.16.7-ckt21) [033edc3a7d4c3fd1560aa41e051d6e79b9545ed0]
 3.2-upstream-stable: released (3.2.73) [kvm-x86-work-around-infinite-loop-in-microcode-when-ac-is.patch]
-2.6.32-upstream-stable: needed
+2.6.32-upstream-stable: ignored "end of life"
 sid: released (4.2.6-1) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
 3.16-jessie-security: released (3.16.7-ckt11-1+deb8u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]
 3.2-wheezy-security: released (3.2.68-1+deb7u6) [bugfix/x86/kvm-x86-vmx-avoid-guest-host-dos-by-intercepting-ac.patch, bugfix/x86/kvm-x86-svm-intercept-ac-to-avoid-guest-host-exploit.patch]




More information about the kernel-sec-discuss mailing list