diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2019-05-06 13:34:03 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2019-05-06 13:34:03 +0200 |
commit | 593c173e811c4791d39abb88e25579a6ab272acd (patch) | |
tree | f1aa8f125d059a87f3fdff686e60f3f908af698d | |
parent | c4f718718008f3b889305d02831377c8f093b561 (diff) |
Mark 4.19.37-1 as released for sid (tagged in git, pending NEW)
-rw-r--r-- | active/CVE-2015-8553 | 2 | ||||
-rw-r--r-- | active/CVE-2018-12929 | 2 | ||||
-rw-r--r-- | active/CVE-2018-12930 | 2 | ||||
-rw-r--r-- | active/CVE-2018-12931 | 2 | ||||
-rw-r--r-- | active/CVE-2019-10125 | 2 | ||||
-rw-r--r-- | active/CVE-2019-11486 | 2 | ||||
-rw-r--r-- | active/CVE-2019-11487 | 2 | ||||
-rw-r--r-- | active/CVE-2019-11599 | 2 | ||||
-rw-r--r-- | active/CVE-2019-3459 | 2 | ||||
-rw-r--r-- | active/CVE-2019-3460 | 2 | ||||
-rw-r--r-- | active/CVE-2019-3882 | 2 | ||||
-rw-r--r-- | active/CVE-2019-3887 | 2 | ||||
-rw-r--r-- | active/CVE-2019-9857 | 2 |
13 files changed, 13 insertions, 13 deletions
diff --git a/active/CVE-2015-8553 b/active/CVE-2015-8553 index 3a870913..636767f4 100644 --- a/active/CVE-2015-8553 +++ b/active/CVE-2015-8553 @@ -20,7 +20,7 @@ upstream: released (5.1-rc1) [7681f31ec9cdacab4fd10570be924f2cef6669ba] 4.9-upstream-stable: needed 3.16-upstream-stable: needed 3.2-upstream-stable: ignored "EOL" -sid: pending (4.19.37-1) [bugfix/all/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch] +sid: released (4.19.37-1) [bugfix/all/xen-pciback-Don-t-disable-PCI_COMMAND-on-PCI-device-.patch] 4.9-stretch-security: ignored "breaks qemu as used in jessie" 3.16-jessie-security: ignored "breaks qemu as used in jessie" 3.2-wheezy-security: ignored "breaks qemu as used in jessie" diff --git a/active/CVE-2018-12929 b/active/CVE-2018-12929 index e7ab0023..a3db2d4d 100644 --- a/active/CVE-2018-12929 +++ b/active/CVE-2018-12929 @@ -7,6 +7,6 @@ upstream: needed 4.19-upstream-stable: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed -sid: pending (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] +sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2018-12930 b/active/CVE-2018-12930 index 10435d6c..524198ef 100644 --- a/active/CVE-2018-12930 +++ b/active/CVE-2018-12930 @@ -8,6 +8,6 @@ upstream: needed 4.19-upstream-stable: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed -sid: pending (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] +sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2018-12931 b/active/CVE-2018-12931 index 8a200c14..22b6af60 100644 --- a/active/CVE-2018-12931 +++ b/active/CVE-2018-12931 @@ -8,6 +8,6 @@ upstream: needed 4.19-upstream-stable: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed -sid: pending (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] +sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2019-10125 b/active/CVE-2019-10125 index e3a02863..c65c98d3 100644 --- a/active/CVE-2019-10125 +++ b/active/CVE-2019-10125 @@ -9,6 +9,6 @@ upstream: released (5.1-rc1) [84c4e1f89fefe70554da0ab33be72c9be7994379] 4.19-upstream-stable: released (4.19.38) [d6b2615f7d31d8e58b685d42dbafcc7dc1204bbd] 4.9-upstream-stable: N/A "Vulnerable code introduced later" 3.16-upstream-stable: N/A "Vulnerable code introduced later" -sid: pending (4.19.37-1) [bugfix/all/0009-aio-simplify-and-fix-fget-fput-for-io_submit.patch] +sid: released (4.19.37-1) [bugfix/all/0009-aio-simplify-and-fix-fget-fput-for-io_submit.patch] 4.9-stretch-security: N/A "Vulnerable code introduced later" 3.16-jessie-security: N/A "Vulnerable code introduced later" diff --git a/active/CVE-2019-11486 b/active/CVE-2019-11486 index 292e1307..54c242e5 100644 --- a/active/CVE-2019-11486 +++ b/active/CVE-2019-11486 @@ -7,6 +7,6 @@ upstream: released (5.1-rc4) [c7084edc3f6d67750f50d4183134c4fb5712a5c8] 4.19-upstream-stable: released (4.19.35) [894dc8495898cf6075eadf99fd496374decd3986] 4.9-upstream-stable: released (4.9.169) [942ddc0de8efb52c43250033c7c6091f15e191f5] 3.16-upstream-stable: released (3.16.66) [e0d2ad5eaec135bb79a7045b1c0718557bac4c4d] -sid: pending (4.19.37-1) +sid: released (4.19.37-1) 4.9-stretch-security: needed 3.16-jessie-security: pending (3.16.66-1) diff --git a/active/CVE-2019-11487 b/active/CVE-2019-11487 index 0f047fd1..2a7ebf6e 100644 --- a/active/CVE-2019-11487 +++ b/active/CVE-2019-11487 @@ -10,6 +10,6 @@ upstream: released (5.1-rc5) [15fab63e1e57be9fdb5eec1bbc5916e9825e9acb, 88b1a17d 4.19-upstream-stable: released (4.19.39) [0311ff82b70fa12e80d188635bff24029ec06ae1, 0612cae7ec6b79d2ff1b34562bab79d5bf96327a, d972ebbf42ba6712460308ae57c222a0706f2af3, 9f6da5fd05577ef4a05c1744cc7098d0173823af] 4.9-upstream-stable: needed 3.16-upstream-stable: needed -sid: pending (4.19.37-1) [bugfix/all/0001-mm-make-page-ref-count-overflow-check-tighter-and-mo.patch, bugfix/all/0002-mm-add-try_get_page-helper-function.patch, bugfix/all/0003-mm-prevent-get_user_pages-from-overflowing-page-refc.patch, bugfix/all/0004-fs-prevent-page-refcount-overflow-in-pipe_buf_get.patch] +sid: released (4.19.37-1) [bugfix/all/0001-mm-make-page-ref-count-overflow-check-tighter-and-mo.patch, bugfix/all/0002-mm-add-try_get_page-helper-function.patch, bugfix/all/0003-mm-prevent-get_user_pages-from-overflowing-page-refc.patch, bugfix/all/0004-fs-prevent-page-refcount-overflow-in-pipe_buf_get.patch] 4.9-stretch-security: needed 3.16-jessie-security: needed diff --git a/active/CVE-2019-11599 b/active/CVE-2019-11599 index 09f3187d..ef5db9e3 100644 --- a/active/CVE-2019-11599 +++ b/active/CVE-2019-11599 @@ -12,6 +12,6 @@ upstream: released (5.1-rc6) [04f5866e41fb70690e28397487d8bd8eea7d712a] 4.19-upstream-stable: released (4.19.37) [6ff17bc5936e5fab33de8064dc0690f6c8c789ca] 4.9-upstream-stable: needed 3.16-upstream-stable: released (3.16.66) [a301e6a651037c11d2d9932a35fb56a04eedba8c] -sid: pending (4.19.37-1) +sid: released (4.19.37-1) 4.9-stretch-security: needed 3.16-jessie-security: pending (3.16.66-1) diff --git a/active/CVE-2019-3459 b/active/CVE-2019-3459 index 1c65d81d..2dfc5111 100644 --- a/active/CVE-2019-3459 +++ b/active/CVE-2019-3459 @@ -7,6 +7,6 @@ upstream: released (5.1-rc1) [7c9cbd0b5e38a1672fcd137894ace3b042dfbf69] 4.19-upstream-stable: released (4.19.33) [15d6538a0d6e0f6de5116081a948cba7cc3e1d3d] 4.9-upstream-stable: released (4.9.167) [99665dcf6ff803351b5e658f3a929cb498561e36] 3.16-upstream-stable: released (3.16.66) [78c2887130f1a7d1883195732be1b6cdab667487] -sid: pending (4.19.37-1) +sid: released (4.19.37-1) 4.9-stretch-security: released (4.9.168-1) 3.16-jessie-security: pending (3.16.66-1) diff --git a/active/CVE-2019-3460 b/active/CVE-2019-3460 index 200d4577..24b517f8 100644 --- a/active/CVE-2019-3460 +++ b/active/CVE-2019-3460 @@ -7,6 +7,6 @@ upstream: released (5.1-rc1) [af3d5d1c87664a4f150fcf3534c6567cb19909b0] 4.19-upstream-stable: released (4.19.33) [2318c0e4b87e590c9d8e88db185477cfac18abe2] 4.9-upstream-stable: released (4.9.167) [def5c1fbee851e9c044ce9fa647238efc15458b4] 3.16-upstream-stable: released (3.16.66) [c5c6a5c7eb7e3d7859e7ec78a2872360e4bab6aa] -sid: pending (4.19.37-1) +sid: released (4.19.37-1) 4.9-stretch-security: released (4.9.168-1) 3.16-jessie-security: pending (3.16.66-1) diff --git a/active/CVE-2019-3882 b/active/CVE-2019-3882 index 52fd920c..233e28c6 100644 --- a/active/CVE-2019-3882 +++ b/active/CVE-2019-3882 @@ -9,6 +9,6 @@ upstream: released (5.1-rc4) [492855939bdb59c6f947b0b5b44af9ad82b7e38c] 4.19-upstream-stable: released (4.19.38) [f7b467ad1be0478f0341afa8a9ac112732def088] 4.9-upstream-stable: released (4.9.173) [4f97abd571ec3d56c50a2edfe0932059f4549afa] 3.16-upstream-stable: released (3.16.66) [d3334471c34797ab1729cbadddd411118d51c584] -sid: pending (4.19.37-1) [bugfix/all/vfio-type1-Limit-DMA-mappings-per-container.patch] +sid: released (4.19.37-1) [bugfix/all/vfio-type1-Limit-DMA-mappings-per-container.patch] 4.9-stretch-security: needed 3.16-jessie-security: pending (3.16.66-1) diff --git a/active/CVE-2019-3887 b/active/CVE-2019-3887 index dbf254a3..d070155a 100644 --- a/active/CVE-2019-3887 +++ b/active/CVE-2019-3887 @@ -7,6 +7,6 @@ upstream: released (5.1-rc4) [acff78477b9b4f26ecdf65733a4ed77fe837e9dc, c73f4c99 4.19-upstream-stable: released (4.19.35) [119031be7b0a2ce4ff4cd5525bec6d42817ff53d, 59bf185ae6b7d1a7ec2d7ff312b94df787ebcb11] 4.9-upstream-stable: N/A "Vulnerability introduced later" 3.16-upstream-stable: N/A "Vulnerability introduced later" -sid: pending (4.19.37-1) +sid: released (4.19.37-1) 4.9-stretch-security: N/A "Vulnerability introduced later" 3.16-jessie-security: N/A "Vulnerability introduced later" diff --git a/active/CVE-2019-9857 b/active/CVE-2019-9857 index b3f5b578..4ecb8618 100644 --- a/active/CVE-2019-9857 +++ b/active/CVE-2019-9857 @@ -11,6 +11,6 @@ upstream: released (5.1-rc2) [62c9d2674b31d4c8a674bee86b7edc6da2803aea] 4.19-upstream-stable: released (4.19.36) [ca306c17d2edcc8aa3bf1724a5cb1ecefc31ef3b] 4.9-upstream-stable: N/A "Vulnerable code not present" 3.16-upstream-stable: N/A "Vulnerable code not present" -sid: pending (4.19.37-1) +sid: released (4.19.37-1) 4.9-stretch-security: N/A "Vulnerable code not present" 3.16-jessie-security: N/A "Vulnerable code not present" |