diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2019-07-02 22:52:08 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2019-07-02 22:54:13 +0200 |
commit | 1add33ebe7a2ee580935bce824f723512a6607b6 (patch) | |
tree | 267072c87f047a41cc4eceed51d68b37642a9b57 | |
parent | 83af2adeae7a6ab994d9f2a122da338da8d5ba0b (diff) |
Fill in status for 4.19-buster-security
46 files changed, 46 insertions, 0 deletions
diff --git a/active/CVE-2013-7445 b/active/CVE-2013-7445 index 18be12a2..3ff31ceb 100644 --- a/active/CVE-2013-7445 +++ b/active/CVE-2013-7445 @@ -9,6 +9,7 @@ upstream: needed 3.16-upstream-stable: ignored "Fix is likely to be too big and risky to backport" 3.2-upstream-stable: ignored "Fix is likely to be too big and risky to backport" sid: needed +4.19-buster-security: needed 4.9-stretch-security: needed 3.16-jessie-security: ignored "Fix is likely to be too big and risky to backport" 3.2-wheezy-security: ignored "Fix is likely to be too big and risky to backport" diff --git a/active/CVE-2015-8553 b/active/CVE-2015-8553 index 9e9a2658..2b6c3f7b 100644 --- a/active/CVE-2015-8553 +++ b/active/CVE-2015-8553 @@ -23,6 +23,7 @@ upstream: released (5.1-rc1) [7681f31ec9cdacab4fd10570be924f2cef6669ba] 3.16-upstream-stable: ignored "breaks qemu versions likely to be used with this kernel version" 3.2-upstream-stable: ignored "EOL" sid: released (4.19.37-1) [bugfix/all/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: ignored "breaks qemu as used in jessie" 3.2-wheezy-security: ignored "breaks qemu as used in jessie" diff --git a/active/CVE-2015-8839 b/active/CVE-2015-8839 index 814c1a3b..b4189aea 100644 --- a/active/CVE-2015-8839 +++ b/active/CVE-2015-8839 @@ -8,6 +8,7 @@ upstream: released (4.5-rc1) [ea3d7209ca01da209cda6f0dea8be9cc4b7a933b, 17048e8a 3.16-upstream-stable: needed 3.2-upstream-stable: ignored "Too much work to backport" sid: released (4.5.1-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: N/A "Fixed before branching point" 3.16-jessie-security: needed 3.2-wheezy-security: ignored "Too much work to backport" diff --git a/active/CVE-2016-10723 b/active/CVE-2016-10723 index 12dbf1e4..0610cc25 100644 --- a/active/CVE-2016-10723 +++ b/active/CVE-2016-10723 @@ -18,5 +18,6 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: needed +4.19-buster-security: needed 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2016-8660 b/active/CVE-2016-8660 index 9ef16dcd..8aec2178 100644 --- a/active/CVE-2016-8660 +++ b/active/CVE-2016-8660 @@ -12,6 +12,7 @@ upstream: needed 3.16-upstream-stable: N/A "Vulnerable code introduced in (4.4-rc1) [fc0561cefc04e7803c0f6501ca4f310a502f65b8]" 3.2-upstream-stable: N/A "Vulnerable code introduced in (4.4-rc1) [fc0561cefc04e7803c0f6501ca4f310a502f65b8]" sid: needed +4.19-buster-security: needed 4.9-stretch-security: needed 3.16-jessie-security: N/A "Vulnerable code not present" 3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2017-0630 b/active/CVE-2017-0630 index cfcda400..600fc141 100644 --- a/active/CVE-2017-0630 +++ b/active/CVE-2017-0630 @@ -10,5 +10,6 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: needed +4.19-buster-security: needed 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2018-10322 b/active/CVE-2018-10322 index 0f1c7a4a..f5e04985 100644 --- a/active/CVE-2018-10322 +++ b/active/CVE-2018-10322 @@ -10,6 +10,7 @@ upstream: released (4.17-rc4) [b42db0860e13067fcc7cbfba3966c9e652668bbc] 3.16-upstream-stable: needed 3.2-upstream-stable: ignored "dinode verifier not implemented" sid: released (4.16.5-1) [bugfix/all/xfs-enhance-dinode-verifier.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: needed 3.2-wheezy-security: ignored "dinode verifier not implemented" diff --git a/active/CVE-2018-10323 b/active/CVE-2018-10323 index 4588833f..792b7495 100644 --- a/active/CVE-2018-10323 +++ b/active/CVE-2018-10323 @@ -10,6 +10,7 @@ upstream: released (4.17-rc4) [2c4306f719b083d17df2963bc761777576b8ad1b] 3.16-upstream-stable: released (3.16.58) [00fe22e3f801fd5225aeecc6bf79630ec201f8e4] 3.2-upstream-stable: ignored "Too much work to backport" sid: released (4.16.5-1) [bugfix/all/xfs-set-format-back-to-extents-if-xfs_bmap_extents_t.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.88-1) [bugfix/all/xfs-set-format-back-to-extents-if-xfs_bmap_extents_t.patch] 3.16-jessie-security: released (3.16.59-1) 3.2-wheezy-security: ignored "Too much work to backport" diff --git a/active/CVE-2018-1108 b/active/CVE-2018-1108 index b5dbe342..897e013a 100644 --- a/active/CVE-2018-1108 +++ b/active/CVE-2018-1108 @@ -15,6 +15,7 @@ upstream: released (4.17-rc2) [43838a23a05fbd13e47d750d3dfd77001536dd33] 3.16-upstream-stable: N/A "Vulnerable code not present" 3.2-upstream-stable: N/A "Vulnerable code not present" sid: released (4.16.5-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: N/A "Vulnerable code not present" 3.2-wheezy-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2018-1121 b/active/CVE-2018-1121 index 7d1a5d86..b275eb3f 100644 --- a/active/CVE-2018-1121 +++ b/active/CVE-2018-1121 @@ -13,6 +13,7 @@ upstream: needed 3.16-upstream-stable: ignored "Fix is likely not be possible without major side effects" 3.2-upstream-stable: ignored "EOL" sid: ignored "Fix is likely not be possible without major side effects" +4.19-buster-security: ignored "Fix is likely not be possible without major side effects" 4.9-stretch-security: ignored "Fix is likely not be possible without major side effects" 3.16-jessie-security: ignored "Fix is likely not be possible without major side effects" 3.2-wheezy-security: ignored "Fix is likely not be possible without major side effects" diff --git a/active/CVE-2018-12928 b/active/CVE-2018-12928 index fb2db0c3..28377137 100644 --- a/active/CVE-2018-12928 +++ b/active/CVE-2018-12928 @@ -14,5 +14,6 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: needed +4.19-buster-security: needed 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2018-12929 b/active/CVE-2018-12929 index a3db2d4d..9818de5e 100644 --- a/active/CVE-2018-12929 +++ b/active/CVE-2018-12929 @@ -8,5 +8,6 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2018-12930 b/active/CVE-2018-12930 index 524198ef..753a3df1 100644 --- a/active/CVE-2018-12930 +++ b/active/CVE-2018-12930 @@ -9,5 +9,6 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2018-12931 b/active/CVE-2018-12931 index 22b6af60..edbac7f0 100644 --- a/active/CVE-2018-12931 +++ b/active/CVE-2018-12931 @@ -9,5 +9,6 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2018-13093 b/active/CVE-2018-13093 index 88e98d33..2083d68d 100644 --- a/active/CVE-2018-13093 +++ b/active/CVE-2018-13093 @@ -9,5 +9,6 @@ upstream: released (4.18-rc1) [afca6c5b2595fc44383919fba740c194b0b76aff] 4.9-upstream-stable: needed 3.16-upstream-stable: released (3.16.58) [7744e6b42712dd27e2457e1eb03b1c73920364c2] sid: released (4.17.14-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: released (3.16.59-1) diff --git a/active/CVE-2018-13094 b/active/CVE-2018-13094 index 4742d588..a4f6b4b0 100644 --- a/active/CVE-2018-13094 +++ b/active/CVE-2018-13094 @@ -9,5 +9,6 @@ upstream: released (4.18-rc1) [bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a] 4.9-upstream-stable: needed 3.16-upstream-stable: released (3.16.58) [991ec538e6683859b065467b8406c7e57526e212] sid: released (4.17.14-1) +4.19-buster-security: N/A "Fixed before branch point" 4.9-stretch-security: needed 3.16-jessie-security: released (3.16.59-1) diff --git a/active/CVE-2018-13095 b/active/CVE-2018-13095 index eedb7656..6b7a3688 100644 --- a/active/CVE-2018-13095 +++ b/active/CVE-2018-13095 @@ -12,5 +12,6 @@ upstream: released (4.18-rc3) [23fcb3340d033d9f081e21e6c12c2db7eaa541d3] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "Too risky to backport" sid: released (4.18.6-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: ignored "Too risky to backport" diff --git a/active/CVE-2018-14610 b/active/CVE-2018-14610 index 19348425..68b6cfa1 100644 --- a/active/CVE-2018-14610 +++ b/active/CVE-2018-14610 @@ -11,5 +11,6 @@ upstream: released (4.19-rc1) [514c7dca85a0bf40be984dab0b477403a6db901f] 4.9-upstream-stable: released (4.9.144) [7a72f918825ddece7a4ed79583836f6f1e06e478] 3.16-upstream-stable: needed sid: released (4.19.9-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.144-1) 3.16-jessie-security: needed diff --git a/active/CVE-2018-14611 b/active/CVE-2018-14611 index c7e76315..9a1a9709 100644 --- a/active/CVE-2018-14611 +++ b/active/CVE-2018-14611 @@ -11,5 +11,6 @@ upstream: released (4.19-rc1) [315409b0098fb2651d86553f0436b70502b29bb2] 4.9-upstream-stable: released (4.9.144) [3c77b07dc365a7ed2644ca0dd38e6e40a9652d57] 3.16-upstream-stable: needed sid: released (4.19.9-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.144-1) 3.16-jessie-security: needed diff --git a/active/CVE-2018-14612 b/active/CVE-2018-14612 index 660b32df..ca867a82 100644 --- a/active/CVE-2018-14612 +++ b/active/CVE-2018-14612 @@ -13,5 +13,6 @@ upstream: released (4.19-rc1) [ba480dd4db9f1798541eb2d1c423fc95feee8d36, 7ef4951 4.9-upstream-stable: released (4.9.144) [6f33d3d8dca8683a4df94e9944296a1a1a2a6f10, 23eb2f435a07e1e09d48ea10c4a22bc96e16fde6] 3.16-upstream-stable: needed sid: released (4.18.8-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.144-1) 3.16-jessie-security: needed diff --git a/active/CVE-2018-14613 b/active/CVE-2018-14613 index dcdc43f6..8449e1f4 100644 --- a/active/CVE-2018-14613 +++ b/active/CVE-2018-14613 @@ -9,5 +9,6 @@ upstream: released (4.19-rc1) [fce466eab7ac6baa9d2dcd88abcf945be3d4a089] 4.9-upstream-stable: released (4.9.144) [058e388e42c8dc5b6ce6248990c75a0459e20197] 3.16-upstream-stable: needed sid: released (4.19.9-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.144-1) 3.16-jessie-security: needed diff --git a/active/CVE-2018-17977 b/active/CVE-2018-17977 index ce03bb63..ce77aef3 100644 --- a/active/CVE-2018-17977 +++ b/active/CVE-2018-17977 @@ -9,5 +9,6 @@ upstream: needed 4.9-upstream-stable: 3.16-upstream-stable: sid: needed +4.19-buster-security: needed 4.9-stretch-security: 3.16-jessie-security: diff --git a/active/CVE-2018-20510 b/active/CVE-2018-20510 index fb9d5c8c..33402af8 100644 --- a/active/CVE-2018-20510 +++ b/active/CVE-2018-20510 @@ -9,5 +9,6 @@ upstream: released (4.16-rc3) [8ca86f1639ec5890d400fff9211aca22d0a392eb) 4.9-upstream-stable: released (4.9.181) [6f3433c47e8223c97746ad227d1e6f5531e0758a] 3.16-upstream-stable: released (3.16.57) [c2c37cd0a0f45dd883fc03b38b04a7f0a269a1ca] sid: released (4.16.5-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: released (3.16.57-1) diff --git a/active/CVE-2018-20836 b/active/CVE-2018-20836 index 201f0f61..31986015 100644 --- a/active/CVE-2018-20836 +++ b/active/CVE-2018-20836 @@ -10,5 +10,6 @@ upstream: released (4.20-rc1) [b90cd6f2b905905fb42671009dc0e27c310a16ae] 4.9-upstream-stable: released (4.9.175) [41b5d3eee4af6a4ea488a1735ed82e4e593eec0d] 3.16-upstream-stable: needed sid: needed +4.19-buster-security: needed 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2018-3646 b/active/CVE-2018-3646 index 363de217..81ceea27 100644 --- a/active/CVE-2018-3646 +++ b/active/CVE-2018-3646 @@ -15,5 +15,6 @@ upstream: released (4.19-rc1) [781fca5b104693bc9242199cc47c690dcaf6a4cb..07d981a 4.9-upstream-stable: released (4.9.120) [329d815667373e858497b5947ad0484194d8c3e2..7f5d090ffe9e7603265e7991aacec64d86cf70ab] 3.16-upstream-stable: needed sid: released (4.17.15-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.110-3+deb9u3) 3.16-jessie-security: needed diff --git a/active/CVE-2018-3693 b/active/CVE-2018-3693 index 641cd876..5803e69d 100644 --- a/active/CVE-2018-3693 +++ b/active/CVE-2018-3693 @@ -18,5 +18,6 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: needed +4.19-buster-security: needed 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2018-5995 b/active/CVE-2018-5995 index 0a6b4a87..2d7ba4a1 100644 --- a/active/CVE-2018-5995 +++ b/active/CVE-2018-5995 @@ -17,5 +17,6 @@ upstream: released (4.15-rc2) [ad67b74d2469d9b82aaa572d76474c95bc484d57] 4.9-upstream-stable: released (4.9.171) [2c4ae3a694fabfc19b0fc6e65d530a7cdb542bda] 3.16-upstream-stable: released (3.16.67) [14c2d9209a135872def8508e3f19c74f0f3fee52] sid: released (4.15.4-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: released (3.16.68-1) diff --git a/active/CVE-2018-9517 b/active/CVE-2018-9517 index 940633a7..db4655bc 100644 --- a/active/CVE-2018-9517 +++ b/active/CVE-2018-9517 @@ -12,5 +12,6 @@ upstream: released (v4.14-rc1) [f026bc29a8e093edfbb2a77700454b285c97e8ad] 4.9-upstream-stable: needed 3.16-upstream-stable: released (3.16.51) [0b3ca265e81f5e1d9f7f66ad416cbabecca914cf] sid: released (4.14.2-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: released (3.16.51-1) diff --git a/active/CVE-2018-ebpf-filter-dos b/active/CVE-2018-ebpf-filter-dos index eaf4ccef..f1809b97 100644 --- a/active/CVE-2018-ebpf-filter-dos +++ b/active/CVE-2018-ebpf-filter-dos @@ -8,5 +8,6 @@ upstream: released (4.20-rc1) [ede95a63b5e84ddeea6b0c473b36ab8bfd8c6ce3] 4.9-upstream-stable: needed 3.16-upstream-stable: N/A "eBPF not implemented" sid: needed +4.19-buster-security: needed 4.9-stretch-security: needed 3.16-jessie-security: N/A "eBPF not implemented" diff --git a/active/CVE-2019-10126 b/active/CVE-2019-10126 index 31d3c750..adf3a4dc 100644 --- a/active/CVE-2019-10126 +++ b/active/CVE-2019-10126 @@ -9,5 +9,6 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: released (4.19.37-4) [bugfix/all/mwifiex-fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/mwifiex-fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch] 3.16-jessie-security: released (3.16.68-2) [bugfix/all/mwifiex-fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch] diff --git a/active/CVE-2019-11477 b/active/CVE-2019-11477 index 806e5f6f..591891e2 100644 --- a/active/CVE-2019-11477 +++ b/active/CVE-2019-11477 @@ -9,5 +9,6 @@ upstream: released (5.2-rc6) [3b4929f65b0d8249f19a50245cd88ed1a2f78cff] 4.9-upstream-stable: released (4.9.182) [cc1b58ccb78e0de51bcec1f2914d9296260668bd] 3.16-upstream-stable: released (3.16.69) [ef27e3c531782ec8213108e11e5515f9724303c7] sid: released (4.19.37-4) [bugfix/all/tcp-limit-payload-size-of-sacked-skbs.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/tcp-limit-payload-size-of-sacked-skbs.patch] 3.16-jessie-security: released (3.16.68-2) [bugfix/all/tcp-limit-payload-size-of-sacked-skbs.patch] diff --git a/active/CVE-2019-11478 b/active/CVE-2019-11478 index 68315549..10634866 100644 --- a/active/CVE-2019-11478 +++ b/active/CVE-2019-11478 @@ -9,5 +9,6 @@ upstream: released (5.2-rc6) [f070ef2ac66716357066b683fb0baf55f8191a2e] 4.9-upstream-stable: released (4.9.182) [e358f4af19db46ca25cc9a8a78412b09ba98859d] 3.16-upstream-stable: released (3.16.69) [dc97a907bc76b71c08e7e99a5b1b30ef4d5e4a85] sid: released (4.19.37-4) [bugfix/all/tcp-tcp_fragment-should-apply-sane-memory-limits.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/tcp-tcp_fragment-should-apply-sane-memory-limits.patch] 3.16-jessie-security: released (3.16.68-2) [bugfix/all/tcp-tcp_fragment-should-apply-sane-memory-limits.patch] diff --git a/active/CVE-2019-11479 b/active/CVE-2019-11479 index be3fd3ea..9c99b811 100644 --- a/active/CVE-2019-11479 +++ b/active/CVE-2019-11479 @@ -10,5 +10,6 @@ upstream: released (5.2-rc6) [5f3e2bf008c2221478101ee72f5cb4654b9fc363, 967c05ae 4.9-upstream-stable: released (4.9.182) [8e39cbc03dafa3731d22533f869bf326c0e6e6f8, 7e9096287352d0416f3caa0919c90bd9ed2f68d3] 3.16-upstream-stable: released (3.16.69) [6b7e7997ad3505db7de85ff12276fc84659481d3, 7ce5a5796ca119c5c6935ea9f4e785f0cb7f39b7] sid: released (4.19.37-4) [bugfix/all/tcp-add-tcp_min_snd_mss-sysctl.patch, bugfix/all/tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/tcp-add-tcp_min_snd_mss-sysctl.patch, bugfix/all/tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch] 3.16-jessie-security: released (3.16.68-2) [bugfix/all/tcp-add-tcp_min_snd_mss-sysctl.patch, bugfix/all/tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch] diff --git a/active/CVE-2019-11487 b/active/CVE-2019-11487 index 81479168..9b55b44d 100644 --- a/active/CVE-2019-11487 +++ b/active/CVE-2019-11487 @@ -13,5 +13,6 @@ upstream: released (5.1-rc5) [15fab63e1e57be9fdb5eec1bbc5916e9825e9acb, 88b1a17d 4.9-upstream-stable: released (4.9.175) [604d7b594c6d18582650dd06b201643b15202232], released (4.9.181) [9557090582a33801349f0a0920a55d134a27e740, 2ed768cfd8956df77f60dd073251699ad3e56cd4, 96019c69145840a498e4e988f56a7524dc0c59b7] 3.16-upstream-stable: needed sid: released (4.19.37-1) [bugfix/all/0001-mm-make-page-ref-count-overflow-check-tighter-and-mo.patch, bugfix/all/0002-mm-add-try_get_page-helper-function.patch, bugfix/all/0003-mm-prevent-get_user_pages-from-overflowing-page-refc.patch, bugfix/all/0004-fs-prevent-page-refcount-overflow-in-pipe_buf_get.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2019-11599 b/active/CVE-2019-11599 index 79c6e260..fae6b698 100644 --- a/active/CVE-2019-11599 +++ b/active/CVE-2019-11599 @@ -15,5 +15,6 @@ upstream: released (5.1-rc6) [04f5866e41fb70690e28397487d8bd8eea7d712a] 4.9-upstream-stable: needed 3.16-upstream-stable: released (3.16.66) [a301e6a651037c11d2d9932a35fb56a04eedba8c] sid: released (4.19.37-1) +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/coredump-fix-race-condition-between-mmget_not_zero-get_task_mm-and-core-dumping.patch] 3.16-jessie-security: released (3.16.68-1) diff --git a/active/CVE-2019-12454 b/active/CVE-2019-12454 index eeda1f7c..b90a5214 100644 --- a/active/CVE-2019-12454 +++ b/active/CVE-2019-12454 @@ -8,5 +8,6 @@ upstream: needed 4.9-upstream-stable: N/A "Vulnerable code introduced in 5.1-rc1" 3.16-upstream-stable: N/A "Vulnerable code introduced in 5.1-rc1" sid: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" 4.9-stretch-security: N/A "Vulnerable code not present" 3.16-jessie-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2019-12456 b/active/CVE-2019-12456 index ef16802a..5c22ab43 100644 --- a/active/CVE-2019-12456 +++ b/active/CVE-2019-12456 @@ -9,5 +9,6 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: needed +4.19-buster-security: needed 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2019-12614 b/active/CVE-2019-12614 index f601d651..ba74d52d 100644 --- a/active/CVE-2019-12614 +++ b/active/CVE-2019-12614 @@ -11,5 +11,6 @@ upstream: needed 4.9-upstream-stable: ignored "Minor issue" 3.16-upstream-stable: ignored "Minor issue" sid: ignored "Minor issue" +4.19-buster-security: ignored "Minor issue" 4.9-stretch-security: ignored "Minor issue" 3.16-jessie-security: N/A "powerpc not supported" diff --git a/active/CVE-2019-12817 b/active/CVE-2019-12817 index b5743443..0efb6236 100644 --- a/active/CVE-2019-12817 +++ b/active/CVE-2019-12817 @@ -10,5 +10,6 @@ upstream: released (5.2-rc7) [ca72d88378b2f2444d3ec145dd442d449d3fefbc] 4.9-upstream-stable: N/A "Vulnerable code introduced later" 3.16-upstream-stable: N/A "Vulnerable code introduced later" sid: needed +4.19-buster-security: needed 4.9-stretch-security: N/A "Vulnerable code not present" 3.16-jessie-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2019-12881 b/active/CVE-2019-12881 index c6666a2c..2048786d 100644 --- a/active/CVE-2019-12881 +++ b/active/CVE-2019-12881 @@ -9,5 +9,6 @@ upstream: 4.9-upstream-stable: 3.16-upstream-stable: sid: +4.19-buster-security: 4.9-stretch-security: 3.16-jessie-security: diff --git a/active/CVE-2019-12984 b/active/CVE-2019-12984 index d1dded38..7ba590b5 100644 --- a/active/CVE-2019-12984 +++ b/active/CVE-2019-12984 @@ -7,5 +7,6 @@ upstream: released (5.2-rc6) [385097a3675749cbc9e97c085c0e5dfe4269ca51] 4.9-upstream-stable: 3.16-upstream-stable: sid: needed +4.19-buster-security: needed 4.9-stretch-security: 3.16-jessie-security: diff --git a/active/CVE-2019-1999 b/active/CVE-2019-1999 index eb6f4a0d..d9237292 100644 --- a/active/CVE-2019-1999 +++ b/active/CVE-2019-1999 @@ -11,5 +11,6 @@ upstream: released (v5.1-rc3) [5cec2d2e5839f9c0fec319c523a911e0a7fd299f] 4.9-upstream-stable: N/A "Vulnerable code introduced later" 3.16-upstream-stable: N/A "Vulnerable code introduced later" sid: needed +4.19-buster-security: needed 4.9-stretch-security: N/A "Vulnerable code introduced later" 3.16-jessie-security: N/A "Vulnerable code introduced later" diff --git a/active/CVE-2019-3846 b/active/CVE-2019-3846 index 62f00597..bf11c4b4 100644 --- a/active/CVE-2019-3846 +++ b/active/CVE-2019-3846 @@ -8,5 +8,6 @@ upstream: released (5.2-rc6) [13ec7f10b87f5fc04c4ccbd491c94c7980236a74] 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: released (4.19.37-4) [bugfix/all/mwifiex-fix-possible-buffer-overflows-at-parsing-bss.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/mwifiex-fix-possible-buffer-overflows-at-parsing-bss.patch] 3.16-jessie-security: released (3.16.68-2) [bugfix/all/mwifiex-fix-possible-buffer-overflows-at-parsing-bss.patch] diff --git a/active/CVE-2019-3874 b/active/CVE-2019-3874 index 0ab66a4d..04579d87 100644 --- a/active/CVE-2019-3874 +++ b/active/CVE-2019-3874 @@ -18,5 +18,6 @@ upstream: released (5.2-rc1) [1033990ac5b2ab6cee93734cb6d301aa3a35bcaa, 9dde27de 4.9-upstream-stable: ignored "Minor issue" 3.16-upstream-stable: ignored "Minor issue" sid: needed +4.19-buster-security: needed 4.9-stretch-security: ignored "Minor issue" 3.16-jessie-security: ignored "Minor issue" diff --git a/active/CVE-2019-3882 b/active/CVE-2019-3882 index a49a3345..df1e62e5 100644 --- a/active/CVE-2019-3882 +++ b/active/CVE-2019-3882 @@ -10,5 +10,6 @@ upstream: released (5.1-rc4) [492855939bdb59c6f947b0b5b44af9ad82b7e38c] 4.9-upstream-stable: released (4.9.173) [4f97abd571ec3d56c50a2edfe0932059f4549afa] 3.16-upstream-stable: released (3.16.66) [d3334471c34797ab1729cbadddd411118d51c584] sid: released (4.19.37-1) [bugfix/all/vfio-type1-Limit-DMA-mappings-per-container.patch] +4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: released (3.16.68-1) diff --git a/active/CVE-2019-3900 b/active/CVE-2019-3900 index 2291663e..53f81670 100644 --- a/active/CVE-2019-3900 +++ b/active/CVE-2019-3900 @@ -8,5 +8,6 @@ upstream: released (5.2-rc4) [e2412c07f8f3040593dfb88207865a3cd58680c0, e79b431f 4.9-upstream-stable: needed 3.16-upstream-stable: needed sid: needed +4.19-buster-security: needed 4.9-stretch-security: needed 3.16-jessie-security: needed |