summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2019-07-02 22:52:08 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2019-07-02 22:54:13 +0200
commit1add33ebe7a2ee580935bce824f723512a6607b6 (patch)
tree267072c87f047a41cc4eceed51d68b37642a9b57
parent83af2adeae7a6ab994d9f2a122da338da8d5ba0b (diff)
Fill in status for 4.19-buster-security
-rw-r--r--active/CVE-2013-74451
-rw-r--r--active/CVE-2015-85531
-rw-r--r--active/CVE-2015-88391
-rw-r--r--active/CVE-2016-107231
-rw-r--r--active/CVE-2016-86601
-rw-r--r--active/CVE-2017-06301
-rw-r--r--active/CVE-2018-103221
-rw-r--r--active/CVE-2018-103231
-rw-r--r--active/CVE-2018-11081
-rw-r--r--active/CVE-2018-11211
-rw-r--r--active/CVE-2018-129281
-rw-r--r--active/CVE-2018-129291
-rw-r--r--active/CVE-2018-129301
-rw-r--r--active/CVE-2018-129311
-rw-r--r--active/CVE-2018-130931
-rw-r--r--active/CVE-2018-130941
-rw-r--r--active/CVE-2018-130951
-rw-r--r--active/CVE-2018-146101
-rw-r--r--active/CVE-2018-146111
-rw-r--r--active/CVE-2018-146121
-rw-r--r--active/CVE-2018-146131
-rw-r--r--active/CVE-2018-179771
-rw-r--r--active/CVE-2018-205101
-rw-r--r--active/CVE-2018-208361
-rw-r--r--active/CVE-2018-36461
-rw-r--r--active/CVE-2018-36931
-rw-r--r--active/CVE-2018-59951
-rw-r--r--active/CVE-2018-95171
-rw-r--r--active/CVE-2018-ebpf-filter-dos1
-rw-r--r--active/CVE-2019-101261
-rw-r--r--active/CVE-2019-114771
-rw-r--r--active/CVE-2019-114781
-rw-r--r--active/CVE-2019-114791
-rw-r--r--active/CVE-2019-114871
-rw-r--r--active/CVE-2019-115991
-rw-r--r--active/CVE-2019-124541
-rw-r--r--active/CVE-2019-124561
-rw-r--r--active/CVE-2019-126141
-rw-r--r--active/CVE-2019-128171
-rw-r--r--active/CVE-2019-128811
-rw-r--r--active/CVE-2019-129841
-rw-r--r--active/CVE-2019-19991
-rw-r--r--active/CVE-2019-38461
-rw-r--r--active/CVE-2019-38741
-rw-r--r--active/CVE-2019-38821
-rw-r--r--active/CVE-2019-39001
46 files changed, 46 insertions, 0 deletions
diff --git a/active/CVE-2013-7445 b/active/CVE-2013-7445
index 18be12a2..3ff31ceb 100644
--- a/active/CVE-2013-7445
+++ b/active/CVE-2013-7445
@@ -9,6 +9,7 @@ upstream: needed
3.16-upstream-stable: ignored "Fix is likely to be too big and risky to backport"
3.2-upstream-stable: ignored "Fix is likely to be too big and risky to backport"
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: ignored "Fix is likely to be too big and risky to backport"
3.2-wheezy-security: ignored "Fix is likely to be too big and risky to backport"
diff --git a/active/CVE-2015-8553 b/active/CVE-2015-8553
index 9e9a2658..2b6c3f7b 100644
--- a/active/CVE-2015-8553
+++ b/active/CVE-2015-8553
@@ -23,6 +23,7 @@ upstream: released (5.1-rc1) [7681f31ec9cdacab4fd10570be924f2cef6669ba]
3.16-upstream-stable: ignored "breaks qemu versions likely to be used with this kernel version"
3.2-upstream-stable: ignored "EOL"
sid: released (4.19.37-1) [bugfix/all/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: ignored "breaks qemu as used in jessie"
3.2-wheezy-security: ignored "breaks qemu as used in jessie"
diff --git a/active/CVE-2015-8839 b/active/CVE-2015-8839
index 814c1a3b..b4189aea 100644
--- a/active/CVE-2015-8839
+++ b/active/CVE-2015-8839
@@ -8,6 +8,7 @@ upstream: released (4.5-rc1) [ea3d7209ca01da209cda6f0dea8be9cc4b7a933b, 17048e8a
3.16-upstream-stable: needed
3.2-upstream-stable: ignored "Too much work to backport"
sid: released (4.5.1-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: N/A "Fixed before branching point"
3.16-jessie-security: needed
3.2-wheezy-security: ignored "Too much work to backport"
diff --git a/active/CVE-2016-10723 b/active/CVE-2016-10723
index 12dbf1e4..0610cc25 100644
--- a/active/CVE-2016-10723
+++ b/active/CVE-2016-10723
@@ -18,5 +18,6 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2016-8660 b/active/CVE-2016-8660
index 9ef16dcd..8aec2178 100644
--- a/active/CVE-2016-8660
+++ b/active/CVE-2016-8660
@@ -12,6 +12,7 @@ upstream: needed
3.16-upstream-stable: N/A "Vulnerable code introduced in (4.4-rc1) [fc0561cefc04e7803c0f6501ca4f310a502f65b8]"
3.2-upstream-stable: N/A "Vulnerable code introduced in (4.4-rc1) [fc0561cefc04e7803c0f6501ca4f310a502f65b8]"
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: N/A "Vulnerable code not present"
3.2-wheezy-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2017-0630 b/active/CVE-2017-0630
index cfcda400..600fc141 100644
--- a/active/CVE-2017-0630
+++ b/active/CVE-2017-0630
@@ -10,5 +10,6 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-10322 b/active/CVE-2018-10322
index 0f1c7a4a..f5e04985 100644
--- a/active/CVE-2018-10322
+++ b/active/CVE-2018-10322
@@ -10,6 +10,7 @@ upstream: released (4.17-rc4) [b42db0860e13067fcc7cbfba3966c9e652668bbc]
3.16-upstream-stable: needed
3.2-upstream-stable: ignored "dinode verifier not implemented"
sid: released (4.16.5-1) [bugfix/all/xfs-enhance-dinode-verifier.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: needed
3.2-wheezy-security: ignored "dinode verifier not implemented"
diff --git a/active/CVE-2018-10323 b/active/CVE-2018-10323
index 4588833f..792b7495 100644
--- a/active/CVE-2018-10323
+++ b/active/CVE-2018-10323
@@ -10,6 +10,7 @@ upstream: released (4.17-rc4) [2c4306f719b083d17df2963bc761777576b8ad1b]
3.16-upstream-stable: released (3.16.58) [00fe22e3f801fd5225aeecc6bf79630ec201f8e4]
3.2-upstream-stable: ignored "Too much work to backport"
sid: released (4.16.5-1) [bugfix/all/xfs-set-format-back-to-extents-if-xfs_bmap_extents_t.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.88-1) [bugfix/all/xfs-set-format-back-to-extents-if-xfs_bmap_extents_t.patch]
3.16-jessie-security: released (3.16.59-1)
3.2-wheezy-security: ignored "Too much work to backport"
diff --git a/active/CVE-2018-1108 b/active/CVE-2018-1108
index b5dbe342..897e013a 100644
--- a/active/CVE-2018-1108
+++ b/active/CVE-2018-1108
@@ -15,6 +15,7 @@ upstream: released (4.17-rc2) [43838a23a05fbd13e47d750d3dfd77001536dd33]
3.16-upstream-stable: N/A "Vulnerable code not present"
3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.16.5-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: N/A "Vulnerable code not present"
3.2-wheezy-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2018-1121 b/active/CVE-2018-1121
index 7d1a5d86..b275eb3f 100644
--- a/active/CVE-2018-1121
+++ b/active/CVE-2018-1121
@@ -13,6 +13,7 @@ upstream: needed
3.16-upstream-stable: ignored "Fix is likely not be possible without major side effects"
3.2-upstream-stable: ignored "EOL"
sid: ignored "Fix is likely not be possible without major side effects"
+4.19-buster-security: ignored "Fix is likely not be possible without major side effects"
4.9-stretch-security: ignored "Fix is likely not be possible without major side effects"
3.16-jessie-security: ignored "Fix is likely not be possible without major side effects"
3.2-wheezy-security: ignored "Fix is likely not be possible without major side effects"
diff --git a/active/CVE-2018-12928 b/active/CVE-2018-12928
index fb2db0c3..28377137 100644
--- a/active/CVE-2018-12928
+++ b/active/CVE-2018-12928
@@ -14,5 +14,6 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-12929 b/active/CVE-2018-12929
index a3db2d4d..9818de5e 100644
--- a/active/CVE-2018-12929
+++ b/active/CVE-2018-12929
@@ -8,5 +8,6 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-12930 b/active/CVE-2018-12930
index 524198ef..753a3df1 100644
--- a/active/CVE-2018-12930
+++ b/active/CVE-2018-12930
@@ -9,5 +9,6 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-12931 b/active/CVE-2018-12931
index 22b6af60..edbac7f0 100644
--- a/active/CVE-2018-12931
+++ b/active/CVE-2018-12931
@@ -9,5 +9,6 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-13093 b/active/CVE-2018-13093
index 88e98d33..2083d68d 100644
--- a/active/CVE-2018-13093
+++ b/active/CVE-2018-13093
@@ -9,5 +9,6 @@ upstream: released (4.18-rc1) [afca6c5b2595fc44383919fba740c194b0b76aff]
4.9-upstream-stable: needed
3.16-upstream-stable: released (3.16.58) [7744e6b42712dd27e2457e1eb03b1c73920364c2]
sid: released (4.17.14-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: released (3.16.59-1)
diff --git a/active/CVE-2018-13094 b/active/CVE-2018-13094
index 4742d588..a4f6b4b0 100644
--- a/active/CVE-2018-13094
+++ b/active/CVE-2018-13094
@@ -9,5 +9,6 @@ upstream: released (4.18-rc1) [bb3d48dcf86a97dc25fe9fc2c11938e19cb4399a]
4.9-upstream-stable: needed
3.16-upstream-stable: released (3.16.58) [991ec538e6683859b065467b8406c7e57526e212]
sid: released (4.17.14-1)
+4.19-buster-security: N/A "Fixed before branch point"
4.9-stretch-security: needed
3.16-jessie-security: released (3.16.59-1)
diff --git a/active/CVE-2018-13095 b/active/CVE-2018-13095
index eedb7656..6b7a3688 100644
--- a/active/CVE-2018-13095
+++ b/active/CVE-2018-13095
@@ -12,5 +12,6 @@ upstream: released (4.18-rc3) [23fcb3340d033d9f081e21e6c12c2db7eaa541d3]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "Too risky to backport"
sid: released (4.18.6-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: ignored "Too risky to backport"
diff --git a/active/CVE-2018-14610 b/active/CVE-2018-14610
index 19348425..68b6cfa1 100644
--- a/active/CVE-2018-14610
+++ b/active/CVE-2018-14610
@@ -11,5 +11,6 @@ upstream: released (4.19-rc1) [514c7dca85a0bf40be984dab0b477403a6db901f]
4.9-upstream-stable: released (4.9.144) [7a72f918825ddece7a4ed79583836f6f1e06e478]
3.16-upstream-stable: needed
sid: released (4.19.9-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.144-1)
3.16-jessie-security: needed
diff --git a/active/CVE-2018-14611 b/active/CVE-2018-14611
index c7e76315..9a1a9709 100644
--- a/active/CVE-2018-14611
+++ b/active/CVE-2018-14611
@@ -11,5 +11,6 @@ upstream: released (4.19-rc1) [315409b0098fb2651d86553f0436b70502b29bb2]
4.9-upstream-stable: released (4.9.144) [3c77b07dc365a7ed2644ca0dd38e6e40a9652d57]
3.16-upstream-stable: needed
sid: released (4.19.9-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.144-1)
3.16-jessie-security: needed
diff --git a/active/CVE-2018-14612 b/active/CVE-2018-14612
index 660b32df..ca867a82 100644
--- a/active/CVE-2018-14612
+++ b/active/CVE-2018-14612
@@ -13,5 +13,6 @@ upstream: released (4.19-rc1) [ba480dd4db9f1798541eb2d1c423fc95feee8d36, 7ef4951
4.9-upstream-stable: released (4.9.144) [6f33d3d8dca8683a4df94e9944296a1a1a2a6f10, 23eb2f435a07e1e09d48ea10c4a22bc96e16fde6]
3.16-upstream-stable: needed
sid: released (4.18.8-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.144-1)
3.16-jessie-security: needed
diff --git a/active/CVE-2018-14613 b/active/CVE-2018-14613
index dcdc43f6..8449e1f4 100644
--- a/active/CVE-2018-14613
+++ b/active/CVE-2018-14613
@@ -9,5 +9,6 @@ upstream: released (4.19-rc1) [fce466eab7ac6baa9d2dcd88abcf945be3d4a089]
4.9-upstream-stable: released (4.9.144) [058e388e42c8dc5b6ce6248990c75a0459e20197]
3.16-upstream-stable: needed
sid: released (4.19.9-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.144-1)
3.16-jessie-security: needed
diff --git a/active/CVE-2018-17977 b/active/CVE-2018-17977
index ce03bb63..ce77aef3 100644
--- a/active/CVE-2018-17977
+++ b/active/CVE-2018-17977
@@ -9,5 +9,6 @@ upstream: needed
4.9-upstream-stable:
3.16-upstream-stable:
sid: needed
+4.19-buster-security: needed
4.9-stretch-security:
3.16-jessie-security:
diff --git a/active/CVE-2018-20510 b/active/CVE-2018-20510
index fb9d5c8c..33402af8 100644
--- a/active/CVE-2018-20510
+++ b/active/CVE-2018-20510
@@ -9,5 +9,6 @@ upstream: released (4.16-rc3) [8ca86f1639ec5890d400fff9211aca22d0a392eb)
4.9-upstream-stable: released (4.9.181) [6f3433c47e8223c97746ad227d1e6f5531e0758a]
3.16-upstream-stable: released (3.16.57) [c2c37cd0a0f45dd883fc03b38b04a7f0a269a1ca]
sid: released (4.16.5-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: released (3.16.57-1)
diff --git a/active/CVE-2018-20836 b/active/CVE-2018-20836
index 201f0f61..31986015 100644
--- a/active/CVE-2018-20836
+++ b/active/CVE-2018-20836
@@ -10,5 +10,6 @@ upstream: released (4.20-rc1) [b90cd6f2b905905fb42671009dc0e27c310a16ae]
4.9-upstream-stable: released (4.9.175) [41b5d3eee4af6a4ea488a1735ed82e4e593eec0d]
3.16-upstream-stable: needed
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-3646 b/active/CVE-2018-3646
index 363de217..81ceea27 100644
--- a/active/CVE-2018-3646
+++ b/active/CVE-2018-3646
@@ -15,5 +15,6 @@ upstream: released (4.19-rc1) [781fca5b104693bc9242199cc47c690dcaf6a4cb..07d981a
4.9-upstream-stable: released (4.9.120) [329d815667373e858497b5947ad0484194d8c3e2..7f5d090ffe9e7603265e7991aacec64d86cf70ab]
3.16-upstream-stable: needed
sid: released (4.17.15-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.110-3+deb9u3)
3.16-jessie-security: needed
diff --git a/active/CVE-2018-3693 b/active/CVE-2018-3693
index 641cd876..5803e69d 100644
--- a/active/CVE-2018-3693
+++ b/active/CVE-2018-3693
@@ -18,5 +18,6 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-5995 b/active/CVE-2018-5995
index 0a6b4a87..2d7ba4a1 100644
--- a/active/CVE-2018-5995
+++ b/active/CVE-2018-5995
@@ -17,5 +17,6 @@ upstream: released (4.15-rc2) [ad67b74d2469d9b82aaa572d76474c95bc484d57]
4.9-upstream-stable: released (4.9.171) [2c4ae3a694fabfc19b0fc6e65d530a7cdb542bda]
3.16-upstream-stable: released (3.16.67) [14c2d9209a135872def8508e3f19c74f0f3fee52]
sid: released (4.15.4-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: released (3.16.68-1)
diff --git a/active/CVE-2018-9517 b/active/CVE-2018-9517
index 940633a7..db4655bc 100644
--- a/active/CVE-2018-9517
+++ b/active/CVE-2018-9517
@@ -12,5 +12,6 @@ upstream: released (v4.14-rc1) [f026bc29a8e093edfbb2a77700454b285c97e8ad]
4.9-upstream-stable: needed
3.16-upstream-stable: released (3.16.51) [0b3ca265e81f5e1d9f7f66ad416cbabecca914cf]
sid: released (4.14.2-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: released (3.16.51-1)
diff --git a/active/CVE-2018-ebpf-filter-dos b/active/CVE-2018-ebpf-filter-dos
index eaf4ccef..f1809b97 100644
--- a/active/CVE-2018-ebpf-filter-dos
+++ b/active/CVE-2018-ebpf-filter-dos
@@ -8,5 +8,6 @@ upstream: released (4.20-rc1) [ede95a63b5e84ddeea6b0c473b36ab8bfd8c6ce3]
4.9-upstream-stable: needed
3.16-upstream-stable: N/A "eBPF not implemented"
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: N/A "eBPF not implemented"
diff --git a/active/CVE-2019-10126 b/active/CVE-2019-10126
index 31d3c750..adf3a4dc 100644
--- a/active/CVE-2019-10126
+++ b/active/CVE-2019-10126
@@ -9,5 +9,6 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: released (4.19.37-4) [bugfix/all/mwifiex-fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/mwifiex-fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch]
3.16-jessie-security: released (3.16.68-2) [bugfix/all/mwifiex-fix-heap-overflow-in-mwifiex_uap_parse_tail_.patch]
diff --git a/active/CVE-2019-11477 b/active/CVE-2019-11477
index 806e5f6f..591891e2 100644
--- a/active/CVE-2019-11477
+++ b/active/CVE-2019-11477
@@ -9,5 +9,6 @@ upstream: released (5.2-rc6) [3b4929f65b0d8249f19a50245cd88ed1a2f78cff]
4.9-upstream-stable: released (4.9.182) [cc1b58ccb78e0de51bcec1f2914d9296260668bd]
3.16-upstream-stable: released (3.16.69) [ef27e3c531782ec8213108e11e5515f9724303c7]
sid: released (4.19.37-4) [bugfix/all/tcp-limit-payload-size-of-sacked-skbs.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/tcp-limit-payload-size-of-sacked-skbs.patch]
3.16-jessie-security: released (3.16.68-2) [bugfix/all/tcp-limit-payload-size-of-sacked-skbs.patch]
diff --git a/active/CVE-2019-11478 b/active/CVE-2019-11478
index 68315549..10634866 100644
--- a/active/CVE-2019-11478
+++ b/active/CVE-2019-11478
@@ -9,5 +9,6 @@ upstream: released (5.2-rc6) [f070ef2ac66716357066b683fb0baf55f8191a2e]
4.9-upstream-stable: released (4.9.182) [e358f4af19db46ca25cc9a8a78412b09ba98859d]
3.16-upstream-stable: released (3.16.69) [dc97a907bc76b71c08e7e99a5b1b30ef4d5e4a85]
sid: released (4.19.37-4) [bugfix/all/tcp-tcp_fragment-should-apply-sane-memory-limits.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/tcp-tcp_fragment-should-apply-sane-memory-limits.patch]
3.16-jessie-security: released (3.16.68-2) [bugfix/all/tcp-tcp_fragment-should-apply-sane-memory-limits.patch]
diff --git a/active/CVE-2019-11479 b/active/CVE-2019-11479
index be3fd3ea..9c99b811 100644
--- a/active/CVE-2019-11479
+++ b/active/CVE-2019-11479
@@ -10,5 +10,6 @@ upstream: released (5.2-rc6) [5f3e2bf008c2221478101ee72f5cb4654b9fc363, 967c05ae
4.9-upstream-stable: released (4.9.182) [8e39cbc03dafa3731d22533f869bf326c0e6e6f8, 7e9096287352d0416f3caa0919c90bd9ed2f68d3]
3.16-upstream-stable: released (3.16.69) [6b7e7997ad3505db7de85ff12276fc84659481d3, 7ce5a5796ca119c5c6935ea9f4e785f0cb7f39b7]
sid: released (4.19.37-4) [bugfix/all/tcp-add-tcp_min_snd_mss-sysctl.patch, bugfix/all/tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/tcp-add-tcp_min_snd_mss-sysctl.patch, bugfix/all/tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch]
3.16-jessie-security: released (3.16.68-2) [bugfix/all/tcp-add-tcp_min_snd_mss-sysctl.patch, bugfix/all/tcp-enforce-tcp_min_snd_mss-in-tcp_mtu_probing.patch]
diff --git a/active/CVE-2019-11487 b/active/CVE-2019-11487
index 81479168..9b55b44d 100644
--- a/active/CVE-2019-11487
+++ b/active/CVE-2019-11487
@@ -13,5 +13,6 @@ upstream: released (5.1-rc5) [15fab63e1e57be9fdb5eec1bbc5916e9825e9acb, 88b1a17d
4.9-upstream-stable: released (4.9.175) [604d7b594c6d18582650dd06b201643b15202232], released (4.9.181) [9557090582a33801349f0a0920a55d134a27e740, 2ed768cfd8956df77f60dd073251699ad3e56cd4, 96019c69145840a498e4e988f56a7524dc0c59b7]
3.16-upstream-stable: needed
sid: released (4.19.37-1) [bugfix/all/0001-mm-make-page-ref-count-overflow-check-tighter-and-mo.patch, bugfix/all/0002-mm-add-try_get_page-helper-function.patch, bugfix/all/0003-mm-prevent-get_user_pages-from-overflowing-page-refc.patch, bugfix/all/0004-fs-prevent-page-refcount-overflow-in-pipe_buf_get.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2019-11599 b/active/CVE-2019-11599
index 79c6e260..fae6b698 100644
--- a/active/CVE-2019-11599
+++ b/active/CVE-2019-11599
@@ -15,5 +15,6 @@ upstream: released (5.1-rc6) [04f5866e41fb70690e28397487d8bd8eea7d712a]
4.9-upstream-stable: needed
3.16-upstream-stable: released (3.16.66) [a301e6a651037c11d2d9932a35fb56a04eedba8c]
sid: released (4.19.37-1)
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/coredump-fix-race-condition-between-mmget_not_zero-get_task_mm-and-core-dumping.patch]
3.16-jessie-security: released (3.16.68-1)
diff --git a/active/CVE-2019-12454 b/active/CVE-2019-12454
index eeda1f7c..b90a5214 100644
--- a/active/CVE-2019-12454
+++ b/active/CVE-2019-12454
@@ -8,5 +8,6 @@ upstream: needed
4.9-upstream-stable: N/A "Vulnerable code introduced in 5.1-rc1"
3.16-upstream-stable: N/A "Vulnerable code introduced in 5.1-rc1"
sid: N/A "Vulnerable code not present"
+4.19-buster-security: N/A "Vulnerable code not present"
4.9-stretch-security: N/A "Vulnerable code not present"
3.16-jessie-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2019-12456 b/active/CVE-2019-12456
index ef16802a..5c22ab43 100644
--- a/active/CVE-2019-12456
+++ b/active/CVE-2019-12456
@@ -9,5 +9,6 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2019-12614 b/active/CVE-2019-12614
index f601d651..ba74d52d 100644
--- a/active/CVE-2019-12614
+++ b/active/CVE-2019-12614
@@ -11,5 +11,6 @@ upstream: needed
4.9-upstream-stable: ignored "Minor issue"
3.16-upstream-stable: ignored "Minor issue"
sid: ignored "Minor issue"
+4.19-buster-security: ignored "Minor issue"
4.9-stretch-security: ignored "Minor issue"
3.16-jessie-security: N/A "powerpc not supported"
diff --git a/active/CVE-2019-12817 b/active/CVE-2019-12817
index b5743443..0efb6236 100644
--- a/active/CVE-2019-12817
+++ b/active/CVE-2019-12817
@@ -10,5 +10,6 @@ upstream: released (5.2-rc7) [ca72d88378b2f2444d3ec145dd442d449d3fefbc]
4.9-upstream-stable: N/A "Vulnerable code introduced later"
3.16-upstream-stable: N/A "Vulnerable code introduced later"
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: N/A "Vulnerable code not present"
3.16-jessie-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2019-12881 b/active/CVE-2019-12881
index c6666a2c..2048786d 100644
--- a/active/CVE-2019-12881
+++ b/active/CVE-2019-12881
@@ -9,5 +9,6 @@ upstream:
4.9-upstream-stable:
3.16-upstream-stable:
sid:
+4.19-buster-security:
4.9-stretch-security:
3.16-jessie-security:
diff --git a/active/CVE-2019-12984 b/active/CVE-2019-12984
index d1dded38..7ba590b5 100644
--- a/active/CVE-2019-12984
+++ b/active/CVE-2019-12984
@@ -7,5 +7,6 @@ upstream: released (5.2-rc6) [385097a3675749cbc9e97c085c0e5dfe4269ca51]
4.9-upstream-stable:
3.16-upstream-stable:
sid: needed
+4.19-buster-security: needed
4.9-stretch-security:
3.16-jessie-security:
diff --git a/active/CVE-2019-1999 b/active/CVE-2019-1999
index eb6f4a0d..d9237292 100644
--- a/active/CVE-2019-1999
+++ b/active/CVE-2019-1999
@@ -11,5 +11,6 @@ upstream: released (v5.1-rc3) [5cec2d2e5839f9c0fec319c523a911e0a7fd299f]
4.9-upstream-stable: N/A "Vulnerable code introduced later"
3.16-upstream-stable: N/A "Vulnerable code introduced later"
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: N/A "Vulnerable code introduced later"
3.16-jessie-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2019-3846 b/active/CVE-2019-3846
index 62f00597..bf11c4b4 100644
--- a/active/CVE-2019-3846
+++ b/active/CVE-2019-3846
@@ -8,5 +8,6 @@ upstream: released (5.2-rc6) [13ec7f10b87f5fc04c4ccbd491c94c7980236a74]
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: released (4.19.37-4) [bugfix/all/mwifiex-fix-possible-buffer-overflows-at-parsing-bss.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.168-1+deb9u3) [bugfix/all/mwifiex-fix-possible-buffer-overflows-at-parsing-bss.patch]
3.16-jessie-security: released (3.16.68-2) [bugfix/all/mwifiex-fix-possible-buffer-overflows-at-parsing-bss.patch]
diff --git a/active/CVE-2019-3874 b/active/CVE-2019-3874
index 0ab66a4d..04579d87 100644
--- a/active/CVE-2019-3874
+++ b/active/CVE-2019-3874
@@ -18,5 +18,6 @@ upstream: released (5.2-rc1) [1033990ac5b2ab6cee93734cb6d301aa3a35bcaa, 9dde27de
4.9-upstream-stable: ignored "Minor issue"
3.16-upstream-stable: ignored "Minor issue"
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: ignored "Minor issue"
3.16-jessie-security: ignored "Minor issue"
diff --git a/active/CVE-2019-3882 b/active/CVE-2019-3882
index a49a3345..df1e62e5 100644
--- a/active/CVE-2019-3882
+++ b/active/CVE-2019-3882
@@ -10,5 +10,6 @@ upstream: released (5.1-rc4) [492855939bdb59c6f947b0b5b44af9ad82b7e38c]
4.9-upstream-stable: released (4.9.173) [4f97abd571ec3d56c50a2edfe0932059f4549afa]
3.16-upstream-stable: released (3.16.66) [d3334471c34797ab1729cbadddd411118d51c584]
sid: released (4.19.37-1) [bugfix/all/vfio-type1-Limit-DMA-mappings-per-container.patch]
+4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: released (3.16.68-1)
diff --git a/active/CVE-2019-3900 b/active/CVE-2019-3900
index 2291663e..53f81670 100644
--- a/active/CVE-2019-3900
+++ b/active/CVE-2019-3900
@@ -8,5 +8,6 @@ upstream: released (5.2-rc4) [e2412c07f8f3040593dfb88207865a3cd58680c0, e79b431f
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: needed
+4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy