summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2019-04-28 19:31:16 +0100
committerBen Hutchings <ben@decadent.org.uk>2019-04-28 19:31:16 +0100
commit1f4a5a8d336c3d4097a7bc81b6397732c6771202 (patch)
tree27e31a45672283ef991e57491f3ea4030427970d
parent50515be306d26f92c0642de9596d03122cc4f998 (diff)
Update status for sid
The upstream version has been bumped to 4.19.37.
-rw-r--r--active/CVE-2015-85532
-rw-r--r--active/CVE-2018-129292
-rw-r--r--active/CVE-2018-129302
-rw-r--r--active/CVE-2018-129312
-rw-r--r--active/CVE-2019-101242
-rw-r--r--active/CVE-2019-114862
-rw-r--r--active/CVE-2019-34592
-rw-r--r--active/CVE-2019-34602
-rw-r--r--active/CVE-2019-38872
-rw-r--r--active/CVE-2019-38922
-rw-r--r--active/CVE-2019-98572
11 files changed, 11 insertions, 11 deletions
diff --git a/active/CVE-2015-8553 b/active/CVE-2015-8553
index e8e4f771..3a870913 100644
--- a/active/CVE-2015-8553
+++ b/active/CVE-2015-8553
@@ -20,7 +20,7 @@ upstream: released (5.1-rc1) [7681f31ec9cdacab4fd10570be924f2cef6669ba]
4.9-upstream-stable: needed
3.16-upstream-stable: needed
3.2-upstream-stable: ignored "EOL"
-sid: pending (4.19.34-1) [bugfix/all/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch]
+sid: pending (4.19.37-1) [bugfix/all/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch]
4.9-stretch-security: ignored "breaks qemu as used in jessie"
3.16-jessie-security: ignored "breaks qemu as used in jessie"
3.2-wheezy-security: ignored "breaks qemu as used in jessie"
diff --git a/active/CVE-2018-12929 b/active/CVE-2018-12929
index 4ec48d32..e7ab0023 100644
--- a/active/CVE-2018-12929
+++ b/active/CVE-2018-12929
@@ -7,6 +7,6 @@ upstream: needed
4.19-upstream-stable: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
-sid: pending (4.19.34-1) [debian/ntfs-mark-it-as-broken.patch]
+sid: pending (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-12930 b/active/CVE-2018-12930
index f24caceb..10435d6c 100644
--- a/active/CVE-2018-12930
+++ b/active/CVE-2018-12930
@@ -8,6 +8,6 @@ upstream: needed
4.19-upstream-stable: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
-sid: pending (4.19.34-1) [debian/ntfs-mark-it-as-broken.patch]
+sid: pending (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-12931 b/active/CVE-2018-12931
index d49e969e..8a200c14 100644
--- a/active/CVE-2018-12931
+++ b/active/CVE-2018-12931
@@ -8,6 +8,6 @@ upstream: needed
4.19-upstream-stable: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
-sid: pending (4.19.34-1) [debian/ntfs-mark-it-as-broken.patch]
+sid: pending (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2019-10124 b/active/CVE-2019-10124
index fc8f336a..c442af84 100644
--- a/active/CVE-2019-10124
+++ b/active/CVE-2019-10124
@@ -6,6 +6,6 @@ upstream: released (5.1-rc1) [46612b751c4941c5c0472ddf04027e877ae5990f]
4.19-upstream-stable: released (4.19.31) [234c0cc982211bb5539db632f31490bf0ad54827]
4.9-upstream-stable: released (4.9.165) [78f42f1156fd661f708cadd9ad9c3f0ac039b411]
3.16-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.19.34-1)
+sid: pending (4.19.37-1)
4.9-stretch-security: released (4.9.168-1)
3.16-jessie-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2019-11486 b/active/CVE-2019-11486
index a859594c..e9b35a96 100644
--- a/active/CVE-2019-11486
+++ b/active/CVE-2019-11486
@@ -7,6 +7,6 @@ upstream: released (5.1-rc4) [c7084edc3f6d67750f50d4183134c4fb5712a5c8]
4.19-upstream-stable: released (4.19.35) [894dc8495898cf6075eadf99fd496374decd3986]
4.9-upstream-stable: released (4.9.169) [942ddc0de8efb52c43250033c7c6091f15e191f5]
3.16-upstream-stable: pending (3.16.66) [tty-mark-siemens-r3964-line-discipline-as-broken.patch]
-sid: pending (4.19.34-1) [bugfix/all/tty-mark-Siemens-R3964-line-discipline-as-BROKEN.patch]
+sid: pending (4.19.37-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2019-3459 b/active/CVE-2019-3459
index 903db91a..0a3f764e 100644
--- a/active/CVE-2019-3459
+++ b/active/CVE-2019-3459
@@ -7,6 +7,6 @@ upstream: released (5.1-rc1) [7c9cbd0b5e38a1672fcd137894ace3b042dfbf69]
4.19-upstream-stable: released (4.19.33) [15d6538a0d6e0f6de5116081a948cba7cc3e1d3d]
4.9-upstream-stable: released (4.9.167) [99665dcf6ff803351b5e658f3a929cb498561e36]
3.16-upstream-stable: pending (3.16.66) [bluetooth-verify-that-l2cap_get_conf_opt-provides-large-enough.patch]
-sid: pending (4.19.34-1)
+sid: pending (4.19.37-1)
4.9-stretch-security: released (4.9.168-1)
3.16-jessie-security: needed
diff --git a/active/CVE-2019-3460 b/active/CVE-2019-3460
index a770cc7f..c6e7edde 100644
--- a/active/CVE-2019-3460
+++ b/active/CVE-2019-3460
@@ -7,6 +7,6 @@ upstream: released (5.1-rc1) [af3d5d1c87664a4f150fcf3534c6567cb19909b0]
4.19-upstream-stable: released (4.19.33) [2318c0e4b87e590c9d8e88db185477cfac18abe2]
4.9-upstream-stable: released (4.9.167) [def5c1fbee851e9c044ce9fa647238efc15458b4]
3.16-upstream-stable: pending (3.16.66) [bluetooth-check-l2cap-option-sizes-returned-from-l2cap_get_conf_opt.patch]
-sid: pending (4.19.34-1)
+sid: pending (4.19.37-1)
4.9-stretch-security: released (4.9.168-1)
3.16-jessie-security: needed
diff --git a/active/CVE-2019-3887 b/active/CVE-2019-3887
index db7b5e39..dbf254a3 100644
--- a/active/CVE-2019-3887
+++ b/active/CVE-2019-3887
@@ -7,6 +7,6 @@ upstream: released (5.1-rc4) [acff78477b9b4f26ecdf65733a4ed77fe837e9dc, c73f4c99
4.19-upstream-stable: released (4.19.35) [119031be7b0a2ce4ff4cd5525bec6d42817ff53d, 59bf185ae6b7d1a7ec2d7ff312b94df787ebcb11]
4.9-upstream-stable: N/A "Vulnerability introduced later"
3.16-upstream-stable: N/A "Vulnerability introduced later"
-sid: needed
+sid: pending (4.19.37-1)
4.9-stretch-security: N/A "Vulnerability introduced later"
3.16-jessie-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2019-3892 b/active/CVE-2019-3892
index e06c2900..8111672f 100644
--- a/active/CVE-2019-3892
+++ b/active/CVE-2019-3892
@@ -11,6 +11,6 @@ upstream: released (5.1-rc6) [04f5866e41fb70690e28397487d8bd8eea7d712a]
4.19-upstream-stable: released (4.19.37) [6ff17bc5936e5fab33de8064dc0690f6c8c789ca]
4.9-upstream-stable: needed
3.16-upstream-stable: pending (3.16.66) [coredump-fix-race-condition-between-mmget_not_zero-get_task_mm.patch]
-sid: needed
+sid: pending (4.19.37-1)
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2019-9857 b/active/CVE-2019-9857
index 537333d3..b3f5b578 100644
--- a/active/CVE-2019-9857
+++ b/active/CVE-2019-9857
@@ -11,6 +11,6 @@ upstream: released (5.1-rc2) [62c9d2674b31d4c8a674bee86b7edc6da2803aea]
4.19-upstream-stable: released (4.19.36) [ca306c17d2edcc8aa3bf1724a5cb1ecefc31ef3b]
4.9-upstream-stable: N/A "Vulnerable code not present"
3.16-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.19.34-1) [bugfix/all/inotify-Fix-fsnotify_mark-refcount-leak-in-inotify_u.patch]
+sid: pending (4.19.37-1)
4.9-stretch-security: N/A "Vulnerable code not present"
3.16-jessie-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy