[kernel-sec-discuss] r5657 - active

Salvatore Bonaccorso carnil at moszumanska.debian.org
Mon Oct 16 04:18:20 UTC 2017


Author: carnil
Date: 2017-10-16 04:18:20 +0000 (Mon, 16 Oct 2017)
New Revision: 5657

Modified:
   active/CVE-2017-1000255
   active/CVE-2017-12188
   active/CVE-2017-15265
   active/CVE-2017-5123
Log:
4.14-rc5 released

Modified: active/CVE-2017-1000255
===================================================================
--- active/CVE-2017-1000255	2017-10-15 13:39:52 UTC (rev 5656)
+++ active/CVE-2017-1000255	2017-10-16 04:18:20 UTC (rev 5657)
@@ -9,7 +9,7 @@
  carnil> "powerpc/tm: Fix illegal TM state in signal handler"
  carnil> 044215d145a7a8a60ffa8fdc859d110a795fa6ea is needed as well.
 Bugs:
-upstream: pending [265e60a170d0a0ecfc2d20490134ed2c48dd45ab]
+upstream: released (4.14-rc5) [265e60a170d0a0ecfc2d20490134ed2c48dd45ab]
 4.9-upstream-stable: released (4.9.55) [afebf5ef60da6d15e75398e41ea2817c7a2bb283]
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.9-rc1 with 5d176f751ee3c6eededd984ad409bff201f436a7"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.9-rc1 with 5d176f751ee3c6eededd984ad409bff201f436a7"

Modified: active/CVE-2017-12188
===================================================================
--- active/CVE-2017-12188	2017-10-15 13:39:52 UTC (rev 5656)
+++ active/CVE-2017-12188	2017-10-16 04:18:20 UTC (rev 5657)
@@ -10,7 +10,7 @@
  carnil> but I'm not 100% certain on the last claim or if we should
  carnil> adress the issue as well for kernels later than 3.12-rc1
 Bugs:
-upstream: pending [fd19d3b45164466a4adce7cbff448ba9189e1427, 829ee279aed43faa5cb1e4d65c0cad52f2426c53]
+upstream: released (4.14-rc5) [fd19d3b45164466a4adce7cbff448ba9189e1427, 829ee279aed43faa5cb1e4d65c0cad52f2426c53]
 4.9-upstream-stable: needed
 3.16-upstream-stable:
 3.2-upstream-stable:

Modified: active/CVE-2017-15265
===================================================================
--- active/CVE-2017-15265	2017-10-15 13:39:52 UTC (rev 5656)
+++ active/CVE-2017-15265	2017-10-16 04:18:20 UTC (rev 5657)
@@ -5,7 +5,7 @@
  http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
 Notes:
 Bugs:
-upstream: pending [71105998845fb012937332fe2e806d443c09e026]
+upstream: released (4.14-rc5) [71105998845fb012937332fe2e806d443c09e026]
 4.9-upstream-stable:
 3.16-upstream-stable:
 3.2-upstream-stable:

Modified: active/CVE-2017-5123
===================================================================
--- active/CVE-2017-5123	2017-10-15 13:39:52 UTC (rev 5656)
+++ active/CVE-2017-5123	2017-10-16 04:18:20 UTC (rev 5657)
@@ -2,7 +2,7 @@
 References:
 Notes:
 Bugs:
-upstream: pending [96ca579a1ecc943b75beba58bebb0356f6cc4b51]
+upstream: released (4.14-rc5) [96ca579a1ecc943b75beba58bebb0356f6cc4b51]
 4.9-upstream-stable: N/A "Vulnerable code introduced in 4.13-rc1 with 4c48abe91be03d191d0c20cc755877da2cb35622"
 3.16-upstream-stable: N/A "Vulnerable code introduced in 4.13-rc1 with 4c48abe91be03d191d0c20cc755877da2cb35622"
 3.2-upstream-stable: N/A "Vulnerable code introduced in 4.13-rc1 with 4c48abe91be03d191d0c20cc755877da2cb35622"




More information about the kernel-sec-discuss mailing list