[kernel-sec-discuss] r4361 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Sun May 8 04:12:30 UTC 2016
Author: carnil
Date: 2016-05-08 04:12:28 +0000 (Sun, 08 May 2016)
New Revision: 4361
Modified:
active/CVE-2016-4557
active/CVE-2016-4558
active/CVE-2016-4565
active/CVE-2016-4568
Log:
Mark 4.5.3-1 as released
Modified: active/CVE-2016-4557
===================================================================
--- active/CVE-2016-4557 2016-05-07 19:00:27 UTC (rev 4360)
+++ active/CVE-2016-4557 2016-05-08 04:12:28 UTC (rev 4361)
@@ -8,6 +8,6 @@
upstream: released (4.6-rc6) [8358b02bf67d3a5d8a825070e1aa73f25fb2e4c7]
3.16-upstream-stable: N/A "Vulnerable code introduced in 0246e64d9a5fcd4805198de59b9b5cf1f974eb41 (3.18-rc1)"
3.2-upstream-stable: N/A "Vulnerable code introduced in 0246e64d9a5fcd4805198de59b9b5cf1f974eb41 (3.18-rc1)"
-sid: pending (4.5.2-2) [bugfix/all/bpf-fix-double-fdput-in-replace_map_fd_with_map_ptr.patch]
+sid: released (4.5.3-1) [bugfix/all/bpf-fix-double-fdput-in-replace_map_fd_with_map_ptr.patch]
3.16-jessie-security: N/A "Vulnerable code not present"
3.2-wheezy-security: N/A "Vulnerable code not present"
Modified: active/CVE-2016-4558
===================================================================
--- active/CVE-2016-4558 2016-05-07 19:00:27 UTC (rev 4360)
+++ active/CVE-2016-4558 2016-05-08 04:12:28 UTC (rev 4361)
@@ -6,6 +6,6 @@
upstream: pending [92117d8443bc5afacc8d5ba82e541946310f106e]
3.16-upstream-stable: N/A "Introduced by 1be7f75d1668d6296b80bf35dcf6762393530afc (4.4-rc1)
3.2-upstream-stable: N/A "Introduced by 1be7f75d1668d6296b80bf35dcf6762393530afc (4.4-rc1)
-sid: pending (4.5.2-2) [bugfix/all/bpf-fix-refcnt-overflow.patch]
+sid: released (4.5.3-1) [bugfix/all/bpf-fix-refcnt-overflow.patch]
3.16-jessie-security: N/A "Vulnerable code ot present"
3.2-wheezy-security: N/A "Vulnerable code ot present"
Modified: active/CVE-2016-4565
===================================================================
--- active/CVE-2016-4565 2016-05-07 19:00:27 UTC (rev 4360)
+++ active/CVE-2016-4565 2016-05-08 04:12:28 UTC (rev 4361)
@@ -5,6 +5,6 @@
upstream: released (4.6-rc6) [e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3]
3.16-upstream-stable: needed
3.2-upstream-stable: needed
-sid: pending (4.5.3-1)
+sid: released (4.5.3-1)
3.16-jessie-security: needed
3.2-wheezy-security: needed
Modified: active/CVE-2016-4568
===================================================================
--- active/CVE-2016-4568 2016-05-07 19:00:27 UTC (rev 4360)
+++ active/CVE-2016-4568 2016-05-08 04:12:28 UTC (rev 4361)
@@ -5,6 +5,6 @@
upstream: released (4.6-rc6) [2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab]
3.16-upstream-stable: N/A "Introduced by b0e0e1f83de31aa0428c38b692c590cc0ecd3f03 in 4.4-rc1"
3.2-upstream-stable: N/A "Introduced by b0e0e1f83de31aa0428c38b692c590cc0ecd3f03 in 4.4-rc1"
-sid: pending (4.5.3-1)
+sid: released (4.5.3-1)
3.16-jessie-security: N/A "Vulnerable code not present"
3.2-wheezy-security: N/A "Vulnerable code not present"
More information about the kernel-sec-discuss
mailing list