summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2019-05-06 13:34:03 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2019-05-06 13:34:03 +0200
commit593c173e811c4791d39abb88e25579a6ab272acd (patch)
treef1aa8f125d059a87f3fdff686e60f3f908af698d
parentc4f718718008f3b889305d02831377c8f093b561 (diff)
Mark 4.19.37-1 as released for sid (tagged in git, pending NEW)
-rw-r--r--active/CVE-2015-85532
-rw-r--r--active/CVE-2018-129292
-rw-r--r--active/CVE-2018-129302
-rw-r--r--active/CVE-2018-129312
-rw-r--r--active/CVE-2019-101252
-rw-r--r--active/CVE-2019-114862
-rw-r--r--active/CVE-2019-114872
-rw-r--r--active/CVE-2019-115992
-rw-r--r--active/CVE-2019-34592
-rw-r--r--active/CVE-2019-34602
-rw-r--r--active/CVE-2019-38822
-rw-r--r--active/CVE-2019-38872
-rw-r--r--active/CVE-2019-98572
13 files changed, 13 insertions, 13 deletions
diff --git a/active/CVE-2015-8553 b/active/CVE-2015-8553
index 3a870913..636767f4 100644
--- a/active/CVE-2015-8553
+++ b/active/CVE-2015-8553
@@ -20,7 +20,7 @@ upstream: released (5.1-rc1) [7681f31ec9cdacab4fd10570be924f2cef6669ba]
4.9-upstream-stable: needed
3.16-upstream-stable: needed
3.2-upstream-stable: ignored "EOL"
-sid: pending (4.19.37-1) [bugfix/all/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch]
+sid: released (4.19.37-1) [bugfix/all/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch]
4.9-stretch-security: ignored "breaks qemu as used in jessie"
3.16-jessie-security: ignored "breaks qemu as used in jessie"
3.2-wheezy-security: ignored "breaks qemu as used in jessie"
diff --git a/active/CVE-2018-12929 b/active/CVE-2018-12929
index e7ab0023..a3db2d4d 100644
--- a/active/CVE-2018-12929
+++ b/active/CVE-2018-12929
@@ -7,6 +7,6 @@ upstream: needed
4.19-upstream-stable: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
-sid: pending (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
+sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-12930 b/active/CVE-2018-12930
index 10435d6c..524198ef 100644
--- a/active/CVE-2018-12930
+++ b/active/CVE-2018-12930
@@ -8,6 +8,6 @@ upstream: needed
4.19-upstream-stable: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
-sid: pending (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
+sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2018-12931 b/active/CVE-2018-12931
index 8a200c14..22b6af60 100644
--- a/active/CVE-2018-12931
+++ b/active/CVE-2018-12931
@@ -8,6 +8,6 @@ upstream: needed
4.19-upstream-stable: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
-sid: pending (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
+sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2019-10125 b/active/CVE-2019-10125
index e3a02863..c65c98d3 100644
--- a/active/CVE-2019-10125
+++ b/active/CVE-2019-10125
@@ -9,6 +9,6 @@ upstream: released (5.1-rc1) [84c4e1f89fefe70554da0ab33be72c9be7994379]
4.19-upstream-stable: released (4.19.38) [d6b2615f7d31d8e58b685d42dbafcc7dc1204bbd]
4.9-upstream-stable: N/A "Vulnerable code introduced later"
3.16-upstream-stable: N/A "Vulnerable code introduced later"
-sid: pending (4.19.37-1) [bugfix/all/0009-aio-simplify-and-fix-fget-fput-for-io_submit.patch]
+sid: released (4.19.37-1) [bugfix/all/0009-aio-simplify-and-fix-fget-fput-for-io_submit.patch]
4.9-stretch-security: N/A "Vulnerable code introduced later"
3.16-jessie-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2019-11486 b/active/CVE-2019-11486
index 292e1307..54c242e5 100644
--- a/active/CVE-2019-11486
+++ b/active/CVE-2019-11486
@@ -7,6 +7,6 @@ upstream: released (5.1-rc4) [c7084edc3f6d67750f50d4183134c4fb5712a5c8]
4.19-upstream-stable: released (4.19.35) [894dc8495898cf6075eadf99fd496374decd3986]
4.9-upstream-stable: released (4.9.169) [942ddc0de8efb52c43250033c7c6091f15e191f5]
3.16-upstream-stable: released (3.16.66) [e0d2ad5eaec135bb79a7045b1c0718557bac4c4d]
-sid: pending (4.19.37-1)
+sid: released (4.19.37-1)
4.9-stretch-security: needed
3.16-jessie-security: pending (3.16.66-1)
diff --git a/active/CVE-2019-11487 b/active/CVE-2019-11487
index 0f047fd1..2a7ebf6e 100644
--- a/active/CVE-2019-11487
+++ b/active/CVE-2019-11487
@@ -10,6 +10,6 @@ upstream: released (5.1-rc5) [15fab63e1e57be9fdb5eec1bbc5916e9825e9acb, 88b1a17d
4.19-upstream-stable: released (4.19.39) [0311ff82b70fa12e80d188635bff24029ec06ae1, 0612cae7ec6b79d2ff1b34562bab79d5bf96327a, d972ebbf42ba6712460308ae57c222a0706f2af3, 9f6da5fd05577ef4a05c1744cc7098d0173823af]
4.9-upstream-stable: needed
3.16-upstream-stable: needed
-sid: pending (4.19.37-1) [bugfix/all/0001-mm-make-page-ref-count-overflow-check-tighter-and-mo.patch, bugfix/all/0002-mm-add-try_get_page-helper-function.patch, bugfix/all/0003-mm-prevent-get_user_pages-from-overflowing-page-refc.patch, bugfix/all/0004-fs-prevent-page-refcount-overflow-in-pipe_buf_get.patch]
+sid: released (4.19.37-1) [bugfix/all/0001-mm-make-page-ref-count-overflow-check-tighter-and-mo.patch, bugfix/all/0002-mm-add-try_get_page-helper-function.patch, bugfix/all/0003-mm-prevent-get_user_pages-from-overflowing-page-refc.patch, bugfix/all/0004-fs-prevent-page-refcount-overflow-in-pipe_buf_get.patch]
4.9-stretch-security: needed
3.16-jessie-security: needed
diff --git a/active/CVE-2019-11599 b/active/CVE-2019-11599
index 09f3187d..ef5db9e3 100644
--- a/active/CVE-2019-11599
+++ b/active/CVE-2019-11599
@@ -12,6 +12,6 @@ upstream: released (5.1-rc6) [04f5866e41fb70690e28397487d8bd8eea7d712a]
4.19-upstream-stable: released (4.19.37) [6ff17bc5936e5fab33de8064dc0690f6c8c789ca]
4.9-upstream-stable: needed
3.16-upstream-stable: released (3.16.66) [a301e6a651037c11d2d9932a35fb56a04eedba8c]
-sid: pending (4.19.37-1)
+sid: released (4.19.37-1)
4.9-stretch-security: needed
3.16-jessie-security: pending (3.16.66-1)
diff --git a/active/CVE-2019-3459 b/active/CVE-2019-3459
index 1c65d81d..2dfc5111 100644
--- a/active/CVE-2019-3459
+++ b/active/CVE-2019-3459
@@ -7,6 +7,6 @@ upstream: released (5.1-rc1) [7c9cbd0b5e38a1672fcd137894ace3b042dfbf69]
4.19-upstream-stable: released (4.19.33) [15d6538a0d6e0f6de5116081a948cba7cc3e1d3d]
4.9-upstream-stable: released (4.9.167) [99665dcf6ff803351b5e658f3a929cb498561e36]
3.16-upstream-stable: released (3.16.66) [78c2887130f1a7d1883195732be1b6cdab667487]
-sid: pending (4.19.37-1)
+sid: released (4.19.37-1)
4.9-stretch-security: released (4.9.168-1)
3.16-jessie-security: pending (3.16.66-1)
diff --git a/active/CVE-2019-3460 b/active/CVE-2019-3460
index 200d4577..24b517f8 100644
--- a/active/CVE-2019-3460
+++ b/active/CVE-2019-3460
@@ -7,6 +7,6 @@ upstream: released (5.1-rc1) [af3d5d1c87664a4f150fcf3534c6567cb19909b0]
4.19-upstream-stable: released (4.19.33) [2318c0e4b87e590c9d8e88db185477cfac18abe2]
4.9-upstream-stable: released (4.9.167) [def5c1fbee851e9c044ce9fa647238efc15458b4]
3.16-upstream-stable: released (3.16.66) [c5c6a5c7eb7e3d7859e7ec78a2872360e4bab6aa]
-sid: pending (4.19.37-1)
+sid: released (4.19.37-1)
4.9-stretch-security: released (4.9.168-1)
3.16-jessie-security: pending (3.16.66-1)
diff --git a/active/CVE-2019-3882 b/active/CVE-2019-3882
index 52fd920c..233e28c6 100644
--- a/active/CVE-2019-3882
+++ b/active/CVE-2019-3882
@@ -9,6 +9,6 @@ upstream: released (5.1-rc4) [492855939bdb59c6f947b0b5b44af9ad82b7e38c]
4.19-upstream-stable: released (4.19.38) [f7b467ad1be0478f0341afa8a9ac112732def088]
4.9-upstream-stable: released (4.9.173) [4f97abd571ec3d56c50a2edfe0932059f4549afa]
3.16-upstream-stable: released (3.16.66) [d3334471c34797ab1729cbadddd411118d51c584]
-sid: pending (4.19.37-1) [bugfix/all/vfio-type1-Limit-DMA-mappings-per-container.patch]
+sid: released (4.19.37-1) [bugfix/all/vfio-type1-Limit-DMA-mappings-per-container.patch]
4.9-stretch-security: needed
3.16-jessie-security: pending (3.16.66-1)
diff --git a/active/CVE-2019-3887 b/active/CVE-2019-3887
index dbf254a3..d070155a 100644
--- a/active/CVE-2019-3887
+++ b/active/CVE-2019-3887
@@ -7,6 +7,6 @@ upstream: released (5.1-rc4) [acff78477b9b4f26ecdf65733a4ed77fe837e9dc, c73f4c99
4.19-upstream-stable: released (4.19.35) [119031be7b0a2ce4ff4cd5525bec6d42817ff53d, 59bf185ae6b7d1a7ec2d7ff312b94df787ebcb11]
4.9-upstream-stable: N/A "Vulnerability introduced later"
3.16-upstream-stable: N/A "Vulnerability introduced later"
-sid: pending (4.19.37-1)
+sid: released (4.19.37-1)
4.9-stretch-security: N/A "Vulnerability introduced later"
3.16-jessie-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2019-9857 b/active/CVE-2019-9857
index b3f5b578..4ecb8618 100644
--- a/active/CVE-2019-9857
+++ b/active/CVE-2019-9857
@@ -11,6 +11,6 @@ upstream: released (5.1-rc2) [62c9d2674b31d4c8a674bee86b7edc6da2803aea]
4.19-upstream-stable: released (4.19.36) [ca306c17d2edcc8aa3bf1724a5cb1ecefc31ef3b]
4.9-upstream-stable: N/A "Vulnerable code not present"
3.16-upstream-stable: N/A "Vulnerable code not present"
-sid: pending (4.19.37-1)
+sid: released (4.19.37-1)
4.9-stretch-security: N/A "Vulnerable code not present"
3.16-jessie-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy