[kernel-sec-discuss] r5657 - active
Salvatore Bonaccorso
carnil at moszumanska.debian.org
Mon Oct 16 04:18:20 UTC 2017
Author: carnil
Date: 2017-10-16 04:18:20 +0000 (Mon, 16 Oct 2017)
New Revision: 5657
Modified:
active/CVE-2017-1000255
active/CVE-2017-12188
active/CVE-2017-15265
active/CVE-2017-5123
Log:
4.14-rc5 released
Modified: active/CVE-2017-1000255
===================================================================
--- active/CVE-2017-1000255 2017-10-15 13:39:52 UTC (rev 5656)
+++ active/CVE-2017-1000255 2017-10-16 04:18:20 UTC (rev 5657)
@@ -9,7 +9,7 @@
carnil> "powerpc/tm: Fix illegal TM state in signal handler"
carnil> 044215d145a7a8a60ffa8fdc859d110a795fa6ea is needed as well.
Bugs:
-upstream: pending [265e60a170d0a0ecfc2d20490134ed2c48dd45ab]
+upstream: released (4.14-rc5) [265e60a170d0a0ecfc2d20490134ed2c48dd45ab]
4.9-upstream-stable: released (4.9.55) [afebf5ef60da6d15e75398e41ea2817c7a2bb283]
3.16-upstream-stable: N/A "Vulnerable code introduced in 4.9-rc1 with 5d176f751ee3c6eededd984ad409bff201f436a7"
3.2-upstream-stable: N/A "Vulnerable code introduced in 4.9-rc1 with 5d176f751ee3c6eededd984ad409bff201f436a7"
Modified: active/CVE-2017-12188
===================================================================
--- active/CVE-2017-12188 2017-10-15 13:39:52 UTC (rev 5656)
+++ active/CVE-2017-12188 2017-10-16 04:18:20 UTC (rev 5657)
@@ -10,7 +10,7 @@
carnil> but I'm not 100% certain on the last claim or if we should
carnil> adress the issue as well for kernels later than 3.12-rc1
Bugs:
-upstream: pending [fd19d3b45164466a4adce7cbff448ba9189e1427, 829ee279aed43faa5cb1e4d65c0cad52f2426c53]
+upstream: released (4.14-rc5) [fd19d3b45164466a4adce7cbff448ba9189e1427, 829ee279aed43faa5cb1e4d65c0cad52f2426c53]
4.9-upstream-stable: needed
3.16-upstream-stable:
3.2-upstream-stable:
Modified: active/CVE-2017-15265
===================================================================
--- active/CVE-2017-15265 2017-10-15 13:39:52 UTC (rev 5656)
+++ active/CVE-2017-15265 2017-10-16 04:18:20 UTC (rev 5657)
@@ -5,7 +5,7 @@
http://mailman.alsa-project.org/pipermail/alsa-devel/2017-October/126292.html
Notes:
Bugs:
-upstream: pending [71105998845fb012937332fe2e806d443c09e026]
+upstream: released (4.14-rc5) [71105998845fb012937332fe2e806d443c09e026]
4.9-upstream-stable:
3.16-upstream-stable:
3.2-upstream-stable:
Modified: active/CVE-2017-5123
===================================================================
--- active/CVE-2017-5123 2017-10-15 13:39:52 UTC (rev 5656)
+++ active/CVE-2017-5123 2017-10-16 04:18:20 UTC (rev 5657)
@@ -2,7 +2,7 @@
References:
Notes:
Bugs:
-upstream: pending [96ca579a1ecc943b75beba58bebb0356f6cc4b51]
+upstream: released (4.14-rc5) [96ca579a1ecc943b75beba58bebb0356f6cc4b51]
4.9-upstream-stable: N/A "Vulnerable code introduced in 4.13-rc1 with 4c48abe91be03d191d0c20cc755877da2cb35622"
3.16-upstream-stable: N/A "Vulnerable code introduced in 4.13-rc1 with 4c48abe91be03d191d0c20cc755877da2cb35622"
3.2-upstream-stable: N/A "Vulnerable code introduced in 4.13-rc1 with 4c48abe91be03d191d0c20cc755877da2cb35622"
More information about the kernel-sec-discuss
mailing list