summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-08-11 21:58:13 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2022-08-11 21:58:13 +0200
commit44ff4849cfd275e1cc0c4852c0d708de3bd42211 (patch)
tree74c000bab710886170b435c84fee69e8e7127b53
parent430d174f3dc8b6d0e43103e3a03e06a0a107e660 (diff)
Mark issues pending for bullseye-security
-rw-r--r--active/CVE-2022-215052
-rw-r--r--active/CVE-2022-25852
-rw-r--r--active/CVE-2022-25862
-rw-r--r--active/CVE-2022-25882
-rw-r--r--active/CVE-2022-263732
-rw-r--r--active/CVE-2022-299002
-rw-r--r--active/CVE-2022-299012
-rw-r--r--active/CVE-2022-368792
-rw-r--r--active/CVE-2022-369462
9 files changed, 9 insertions, 9 deletions
diff --git a/active/CVE-2022-21505 b/active/CVE-2022-21505
index d83b8b9a..7c139efd 100644
--- a/active/CVE-2022-21505
+++ b/active/CVE-2022-21505
@@ -12,5 +12,5 @@ upstream: released (5.19-rc8) [543ce63b664e2c2f9533d089a4664b559c3e6b5b]
5.10-upstream-stable: released (5.10.134) [ab5050fd7430dde3a9f073129036d3da3facc8ec]
4.19-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.18.16-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.135-1)
4.19-buster-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2022-2585 b/active/CVE-2022-2585
index 251c953f..d2a1ecc5 100644
--- a/active/CVE-2022-2585
+++ b/active/CVE-2022-2585
@@ -8,5 +8,5 @@ upstream: needed
5.10-upstream-stable: needed
4.19-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.18.16-1) [bugfix/all/posix-cpu-timers-Cleanup-CPU-timers-before-freeing-t.patch]
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.135-1) [bugfix/all/posix-cpu-timers-Cleanup-CPU-timers-before-freeing-t.patch]
4.19-buster-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2022-2586 b/active/CVE-2022-2586
index 30dc4108..13aefa80 100644
--- a/active/CVE-2022-2586
+++ b/active/CVE-2022-2586
@@ -8,5 +8,5 @@ upstream: needed
5.10-upstream-stable: needed
4.19-upstream-stable: needed
sid: released (5.18.16-1) [bugfix/all/netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to-.patch]
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.135-1) [bugfix/all/netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to-.patch]
4.19-buster-security: needed
diff --git a/active/CVE-2022-2588 b/active/CVE-2022-2588
index 3a75a252..26b9f182 100644
--- a/active/CVE-2022-2588
+++ b/active/CVE-2022-2588
@@ -8,5 +8,5 @@ upstream: needed
5.10-upstream-stable: needed
4.19-upstream-stable: needed
sid: released (5.18.16-1) [bugfix/all/net_sched-cls_route-remove-from-list-when-handle-is-.patch]
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.135-1) [bugfix/all/net_sched-cls_route-remove-from-list-when-handle-is-.patch]
4.19-buster-security: needed
diff --git a/active/CVE-2022-26373 b/active/CVE-2022-26373
index ab97b442..a0081001 100644
--- a/active/CVE-2022-26373
+++ b/active/CVE-2022-26373
@@ -9,5 +9,5 @@ upstream: pending [2b1299322016731d56807aa49254a5ea3080b6b3, ba6e31af2be96c4d053
5.10-upstream-stable: released (5.10.136) [509c2c9fe75ea7493eebbb6bb2f711f37530ae19, 1bea03b44ea2267988cce064f5887b01d421b28c]
4.19-upstream-stable: released (4.19.255) [b6c5011934a15762cd694e36fe74f2f2f93eac9b, b1c9f470fb724d3cfd6cf8fe4a70c2ec4de2e9f4]
sid: released (5.18.16-1) [bugfix/x86/pbrsb/0001-x86-speculation-Add-RSB-VM-Exit-protections.patch, bugfix/x86/pbrsb/0002-x86-speculation-Add-LFENCE-to-RSB-fill-sequence.patch]
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.135-1) [bugfix/x86/pbrsb/0001-x86-speculation-Add-RSB-VM-Exit-protections.patch, bugfix/x86/pbrsb/0002-x86-speculation-Add-LFENCE-to-RSB-fill-sequence.patch]
4.19-buster-security: needed
diff --git a/active/CVE-2022-29900 b/active/CVE-2022-29900
index 317897bf..691d2379 100644
--- a/active/CVE-2022-29900
+++ b/active/CVE-2022-29900
@@ -20,5 +20,5 @@ upstream: released (5.19-rc7) [742ab6df974ae8384a2dd213db1a3a06cf6d8936, a883d62
5.10-upstream-stable: released (5.10.133) [7070bbb66c5303117e4c7651711ea7daae4c64b5, feec5277d5aa9780d4814084262b98af2b1a2242, 6a2b142886c52244a9c1dfb0a36971daa963541a, 3e519ed8d509f5f2e1c67984f3cdf079b725e724, 37b9bb094123a14a986137d693b5aa18a240128b, 270de63cf4a380fe9942d3e0da599c0e966fad78, 716410960ba0a2d2c3f59cb46315467c9faf59b2, 8bdb25f7aee312450e9c9ac21ae209d9cf0602e5, 446eb6f08936e6f87bea9f35be05556a7211df9b, 7723edf5edfdfdabd8234e45142be86598a04cad, 00b136bb6254e0abf6aaafe62c4da5f6c4fea4cb, e0e06a922706204df43d50032c05af75d8e75f8e, ee4996f07d868ee6cc7e76151dfab9a2344cdeb0, d6eb50e9b7245a238872a9a969f84993339780a5, 5b2edaf709b50c81b3c6ddb745c8a76ab6632645, c9eb5dcdc8f4a848b45b97725f5a2b8d324bb31a, c70d6f82141b89db6c076b0cbf9a7a2edc29e46d, df748593c55389892902aecb8691080ad5e8cff5, 876750cca4f043bd626a3ac760ce887dda3b6ec7, 3f29791d56d32a610a2b57a9b700b1bc1912e41f, a989e75136192036d47e4dc4fe87ff9c961d6b46, 9e727e0d9486121de5c21cbb65fcc0c907834b17, 3dddacf8c3cc29b9b37d8c4353f746e510ad1371, 6d7e13ccc4d73e5c88cc015bc0154b7d08f65038, dabc2a1b406ae0ff5286c91f7519b3e20ec2aa63, a0f8ef71d762501769df69e35c4c4e7496866d90, e8142e2d6cb6b39fdd78bc17199429f79bcd051c, 55bba093fd91a76971134e3a4e3576e536c08f5c, 28aa3fa0b2c9d0cd7bdac42d9eb7fe3d5f6c79e8, f728eff26339d85825e588d461f0e55267bc6c3f, c8845b875437b8ea9cd023f15b44c436c9c5b62d, fbab1c94eb1a3139d7ac0620dc6d7d6a33f3b255, 0d1a8a16e62c8048f2ff7f9c6f448bf595d2a2a8, ea1aa926f423a8cf1b2416bb909bfbea37d12b11, f1b01ace814b0a8318041e3aea5fd36cc74f09b0, d29c07912a49fce965228f73a293e2c899bc7e35, aad83db22e9950577b5b827f57ed7108b3ca5553, ce11f91b21c25dda8b06988817115bef1c636434, 1dbefa57725204be0348351ea4756c52b10b3504, df93717a32f57e1b033dbfa2a78809d7d4000648, 07401c2311f6fddd3c49a392eafc2c28a899f768, 84061fff2ad98a7809f00e88a54f584f84830388, 5269be9111e2b66572e78647f2e8948f7fc96466, 47ae76fb27398e867980d63789058ff7c4f12a35, 4d7f72b6e1bc630bec7e4cd51814bc2b092bf153, a74f5d23e68d9687ed06bd462d344867824707d8, f7851ed697be2ce86bd8baf29111762b7b3ff6cc, b24fdd0f1c3328cf8ee0c518b93a7187f8cee097, 609336351d08699395be24860902e6e0b7860e2b, 51552b6b52fc865f37ef3ddacd27d807a36695ac, c2ca992144281917cfae19d231b1195c02906a4e, eb38964b6ff864b8bdf87c9cf6221d0b0611a990, c035ca88b0742952150b1671bb5d26b96f921245]
4.19-upstream-stable: needed
sid: released (5.18.14-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.135-1)
4.19-buster-security: needed
diff --git a/active/CVE-2022-29901 b/active/CVE-2022-29901
index b1ca4d45..a7f287f6 100644
--- a/active/CVE-2022-29901
+++ b/active/CVE-2022-29901
@@ -19,5 +19,5 @@ upstream: released (5.19-rc7) [742ab6df974ae8384a2dd213db1a3a06cf6d8936, a883d62
5.10-upstream-stable: released (5.10.133) [7070bbb66c5303117e4c7651711ea7daae4c64b5, feec5277d5aa9780d4814084262b98af2b1a2242, 6a2b142886c52244a9c1dfb0a36971daa963541a, 3e519ed8d509f5f2e1c67984f3cdf079b725e724, 37b9bb094123a14a986137d693b5aa18a240128b, 270de63cf4a380fe9942d3e0da599c0e966fad78, 716410960ba0a2d2c3f59cb46315467c9faf59b2, 8bdb25f7aee312450e9c9ac21ae209d9cf0602e5, 446eb6f08936e6f87bea9f35be05556a7211df9b, 7723edf5edfdfdabd8234e45142be86598a04cad, 00b136bb6254e0abf6aaafe62c4da5f6c4fea4cb, e0e06a922706204df43d50032c05af75d8e75f8e, ee4996f07d868ee6cc7e76151dfab9a2344cdeb0, d6eb50e9b7245a238872a9a969f84993339780a5, 5b2edaf709b50c81b3c6ddb745c8a76ab6632645, c9eb5dcdc8f4a848b45b97725f5a2b8d324bb31a, c70d6f82141b89db6c076b0cbf9a7a2edc29e46d, df748593c55389892902aecb8691080ad5e8cff5, 876750cca4f043bd626a3ac760ce887dda3b6ec7, 3f29791d56d32a610a2b57a9b700b1bc1912e41f, a989e75136192036d47e4dc4fe87ff9c961d6b46, 9e727e0d9486121de5c21cbb65fcc0c907834b17, 3dddacf8c3cc29b9b37d8c4353f746e510ad1371, 6d7e13ccc4d73e5c88cc015bc0154b7d08f65038, dabc2a1b406ae0ff5286c91f7519b3e20ec2aa63, a0f8ef71d762501769df69e35c4c4e7496866d90, e8142e2d6cb6b39fdd78bc17199429f79bcd051c, 55bba093fd91a76971134e3a4e3576e536c08f5c, 28aa3fa0b2c9d0cd7bdac42d9eb7fe3d5f6c79e8, f728eff26339d85825e588d461f0e55267bc6c3f, c8845b875437b8ea9cd023f15b44c436c9c5b62d, fbab1c94eb1a3139d7ac0620dc6d7d6a33f3b255, 0d1a8a16e62c8048f2ff7f9c6f448bf595d2a2a8, ea1aa926f423a8cf1b2416bb909bfbea37d12b11, f1b01ace814b0a8318041e3aea5fd36cc74f09b0, d29c07912a49fce965228f73a293e2c899bc7e35, aad83db22e9950577b5b827f57ed7108b3ca5553, ce11f91b21c25dda8b06988817115bef1c636434, 1dbefa57725204be0348351ea4756c52b10b3504, df93717a32f57e1b033dbfa2a78809d7d4000648, 07401c2311f6fddd3c49a392eafc2c28a899f768, 84061fff2ad98a7809f00e88a54f584f84830388, 5269be9111e2b66572e78647f2e8948f7fc96466, 47ae76fb27398e867980d63789058ff7c4f12a35, 4d7f72b6e1bc630bec7e4cd51814bc2b092bf153, a74f5d23e68d9687ed06bd462d344867824707d8, f7851ed697be2ce86bd8baf29111762b7b3ff6cc, b24fdd0f1c3328cf8ee0c518b93a7187f8cee097, 609336351d08699395be24860902e6e0b7860e2b, 51552b6b52fc865f37ef3ddacd27d807a36695ac, c2ca992144281917cfae19d231b1195c02906a4e, eb38964b6ff864b8bdf87c9cf6221d0b0611a990, c035ca88b0742952150b1671bb5d26b96f921245]
4.19-upstream-stable: needed
sid: released (5.18.14-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.135-1)
4.19-buster-security: needed
diff --git a/active/CVE-2022-36879 b/active/CVE-2022-36879
index c733cf22..4e809c62 100644
--- a/active/CVE-2022-36879
+++ b/active/CVE-2022-36879
@@ -7,5 +7,5 @@ upstream: released (5.19-rc8) [f85daf0e725358be78dfd208dea5fd665d8cb901]
5.10-upstream-stable: released (5.10.134) [47b696dd654450cdec3103a833e5bf29c4b83bfa]
4.19-upstream-stable: released (4.19.254) [fdb4fba1ba8512fa579a9d091dcb6c410f82f96a]
sid: released (5.18.16-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.135-1)
4.19-buster-security: pending (4.19.254-1)
diff --git a/active/CVE-2022-36946 b/active/CVE-2022-36946
index 5118e2a7..be9cc0a1 100644
--- a/active/CVE-2022-36946
+++ b/active/CVE-2022-36946
@@ -10,5 +10,5 @@ upstream: released (5.19) [99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164]
5.10-upstream-stable: released (5.10.135) [440dccd80f627e0e11ceb0429e4cdab61857d17e]
4.19-upstream-stable: released (4.19.255) [f295d365b30626f82423a923695274024016380e]
sid: released (5.18.16-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.135-1)
4.19-buster-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy