summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-02-27 10:16:40 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2022-02-27 10:16:40 +0100
commit749f8855c581c82daa037bce0469a9ef4da2ed19 (patch)
tree9bd86ffc78e8a6019ddf450885c7736a1bc77671
parente2b0c9507c1b1e29be536c96d893f344f69ff687 (diff)
Mark issues pending for bullseye-security
-rw-r--r--active/CVE-2021-439762
-rw-r--r--active/CVE-2022-03302
-rw-r--r--active/CVE-2022-04352
-rw-r--r--active/CVE-2022-05162
-rw-r--r--active/CVE-2022-229422
-rw-r--r--active/CVE-2022-244482
-rw-r--r--active/CVE-2022-249592
-rw-r--r--active/CVE-2022-252582
-rw-r--r--active/CVE-2022-253752
9 files changed, 9 insertions, 9 deletions
diff --git a/active/CVE-2021-43976 b/active/CVE-2021-43976
index d0028cad..f9987077 100644
--- a/active/CVE-2021-43976
+++ b/active/CVE-2021-43976
@@ -10,6 +10,6 @@ upstream: released (5.17-rc1) [04d80663f67ccef893061b49ec8a42ff7045ae84]
4.19-upstream-stable: released (4.19.226) [2f4b037bf6e8c663a593b8149263c5b6940c7afd]
4.9-upstream-stable: released (4.9.298) [b233d7395cd104398dd83f130df5f0d57036c95e]
sid: released (5.15.15-2) [bugfix/x86/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch]
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.92-2) [bugfix/x86/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch]
4.19-buster-security: needed
4.9-stretch-security: pending (4.9.299-1)
diff --git a/active/CVE-2022-0330 b/active/CVE-2022-0330
index ceaecc10..3d507df9 100644
--- a/active/CVE-2022-0330
+++ b/active/CVE-2022-0330
@@ -9,6 +9,6 @@ upstream: released (5.17-rc2) [7938d61591d33394a21bdd7797a245b65428f44c]
4.19-upstream-stable: released (4.19.227) [b188780649081782e341e52223db47c49f172712]
4.9-upstream-stable: released (4.9.299) [84f4ab5b47d955ad2bb30115d7841d3e8f0994f4]
sid: released (5.15.15-2) [bugfix/x86/drm-i915-Flush-TLBs-before-releasing-backing-store.patch]
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.92-2) [bugfix/x86/drm-i915-Flush-TLBs-before-releasing-backing-store.patch]
4.19-buster-security: needed
4.9-stretch-security: pending (4.9.299-1)
diff --git a/active/CVE-2022-0435 b/active/CVE-2022-0435
index 0ea2495f..4a5551fc 100644
--- a/active/CVE-2022-0435
+++ b/active/CVE-2022-0435
@@ -11,6 +11,6 @@ upstream: released (5.17-rc4) [9aa422ad326634b76309e8ff342c246800621216]
4.19-upstream-stable: released (4.19.229) [f1af11edd08dd8376f7a84487cbb0ea8203e3a1d]
4.9-upstream-stable: released (4.9.301) [175db196e45d6f0e6047eccd09c8ba55465eb131]
sid: released (5.16.10-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.92-2) [bugfix/all/tipc-improve-size-validations-for-received-domain-re.patch]
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2022-0516 b/active/CVE-2022-0516
index eced694e..1d26e8c5 100644
--- a/active/CVE-2022-0516
+++ b/active/CVE-2022-0516
@@ -12,6 +12,6 @@ upstream: released (5.17-rc4) [2c212e1baedcd782b2535a3f86bc491977677c0e]
4.19-upstream-stable: N/A "Vulnerable code not present"
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.16.10-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.92-2) [bugfix/s390x/KVM-s390-Return-error-on-SIDA-memop-on-normal-guest.patch]
4.19-buster-security: N/A "Vulnerable code not present"
4.9-stretch-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-22942 b/active/CVE-2022-22942
index 0702a328..2cf6b191 100644
--- a/active/CVE-2022-22942
+++ b/active/CVE-2022-22942
@@ -12,6 +12,6 @@ upstream: released (5.17-rc2) [a0f90c8815706981c483a652a6aefca51a5e191c]
4.19-upstream-stable: released (4.19.227) [0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d]
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.15.15-2) [bugfix/all/drm-vmwgfx-Fix-stale-file-descriptors-on-failed-user.patch]
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.92-2) [bugfix/x86/drm-vmwgfx-Fix-stale-file-descriptors-on-failed-user.patch]
4.19-buster-security: needed
4.9-stretch-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-24448 b/active/CVE-2022-24448
index abf12ed3..ed043c3e 100644
--- a/active/CVE-2022-24448
+++ b/active/CVE-2022-24448
@@ -8,6 +8,6 @@ upstream: released (5.17-rc2) [ac795161c93699d600db16c1a8cc23a65a1eceaf]
4.19-upstream-stable: released (4.19.228) [b00b4c6faad0f21e443fb1584f7a8ea222beb0de]
4.9-upstream-stable: released (4.9.300) [8788981e120694a82a3672e062fe4ea99446634a]
sid: released (5.16.7-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.92-2) [bugfix/all/NFSv4-Handle-case-where-the-lookup-of-a-directory-fa.patch]
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2022-24959 b/active/CVE-2022-24959
index 419487e3..438394d1 100644
--- a/active/CVE-2022-24959
+++ b/active/CVE-2022-24959
@@ -10,6 +10,6 @@ upstream: released (5.17-rc2) [29eb31542787e1019208a2e1047bb7c76c069536]
4.19-upstream-stable: released (4.19.228) [4bd197ce18329e3725fe3af5bd27daa4256d3ac7]
4.9-upstream-stable: N/A "Vulnerability introduced later"
sid: released (5.16.7-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.92-2) [bugfix/all/yam-fix-a-memory-leak-in-yam_siocdevprivate.patch]
4.19-buster-security: needed
4.9-stretch-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2022-25258 b/active/CVE-2022-25258
index 4a8ba9ee..825ae5d6 100644
--- a/active/CVE-2022-25258
+++ b/active/CVE-2022-25258
@@ -8,6 +8,6 @@ upstream: released (5.17-rc4) [75e5b4849b81e19e9efe1654b30d7f3151c33c2c]
4.19-upstream-stable: released (4.19.230) [e5eb8d19aee115d8fb354d1eff1b8df700467164]
4.9-upstream-stable: released (4.9.302) [f3bcd744b0bc8dcc6cdb3ac5be20f54aecfb78a4]
sid: released (5.16.10-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.92-2) [bugfix/all/USB-gadget-validate-interface-OS-descriptor-requests.patch]
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2022-25375 b/active/CVE-2022-25375
index 8bd35c4a..6f1590f5 100644
--- a/active/CVE-2022-25375
+++ b/active/CVE-2022-25375
@@ -9,6 +9,6 @@ upstream: released (5.17-rc4) [38ea1eac7d88072bbffb630e2b3db83ca649b826]
4.19-upstream-stable: released (4.19.230) [db9aaa3026298d652e98f777bc0f5756e2455dda]
4.9-upstream-stable: released (4.9.302) [ff0a90739925734c91c7e39befe3f4378e0c1369]
sid: released (5.16.10-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.92-2) [bugfix/all/usb-gadget-rndis-check-size-of-RNDIS_MSG_SET-command.patch]
4.19-buster-security: needed
4.9-stretch-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy