Skip to content

Commit

Permalink
Bumping os images for cve
Browse files Browse the repository at this point in the history
- USN-3392-2: Linux kernel (Xenial HWE) regression

[#150300251](https://www.pivotaltracker.com/story/show/150300251)

Signed-off-by: James Young <[email protected]>
  • Loading branch information
dpb587-pivotal authored and pronoiac committed Aug 16, 2017
1 parent 77a015d commit 276eadc
Show file tree
Hide file tree
Showing 2 changed files with 10 additions and 2 deletions.
8 changes: 8 additions & 0 deletions bosh-stemcell/OS_IMAGES.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,10 @@ OS images are stored in S3 bucket [bosh-os-images](http://s3.amazonaws.com/bosh-

Ubuntu 14.04 images have filename `bosh-ubuntu-trusty-os-image.tgz`

* `795Bgks7KtLQxfPiYkhzmXcVO3GGak9H`
- USN-3392-2: Linux kernel (Xenial HWE) regression
- built from 3445.x (fbc0bac4c0f405fafc4fe4bf846adec93022e056)

* `lFTzZ3l8SjN7jdGk20ccirvC8Zmgpwjg`
- USN-3385-2: Linux kernel (Xenial HWE) vulnerabilities
- built from master (0bbb162561f121136057610655b425b8dfaed928)
Expand Down Expand Up @@ -603,6 +607,10 @@ CentOS 6.6 images have filename `bosh-centos-6-os-image.tgz`

CentOS 7 images have filename `bosh-centos-7-os-image.tgz`

* `E4nGcx.1jle3B4MPjLbCUi8oDUjN12tZ`
- Periodic bump
- built from 3445.x (fbc0bac4c0f405fafc4fe4bf846adec93022e056)

* `MOpHI7NvEQyUoGjMDEzqU2vR3nNqoDj4`
- Periodic bump
- built from master (0bbb162561f121136057610655b425b8dfaed928)
Expand Down
4 changes: 2 additions & 2 deletions bosh-stemcell/os_image_versions.json
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
"bosh-centos-6-os-image.tgz": "kkUYP.4sM_hdsn3Sfcr6ksahFpPgb2D8",
"bosh-centos-7-os-image.tgz": "MOpHI7NvEQyUoGjMDEzqU2vR3nNqoDj4",
"bosh-ubuntu-trusty-os-image.tgz": "lFTzZ3l8SjN7jdGk20ccirvC8Zmgpwjg"
"bosh-centos-7-os-image.tgz": "E4nGcx.1jle3B4MPjLbCUi8oDUjN12tZ",
"bosh-ubuntu-trusty-os-image.tgz": "795Bgks7KtLQxfPiYkhzmXcVO3GGak9H"
}

0 comments on commit 276eadc

Please sign in to comment.