summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-08-10 20:15:54 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2022-08-10 20:15:54 +0200
commita7768c216cb17f163fd39d6bc611858856c36b2c (patch)
tree71cd3f2a4845ed633af31ff836d8cbc721862863
parent4976f01fe8de104d783355197e197d65270621be (diff)
Mark 5.18.16-1 as released for sid
-rw-r--r--active/CVE-2022-215052
-rw-r--r--active/CVE-2022-25852
-rw-r--r--active/CVE-2022-25862
-rw-r--r--active/CVE-2022-25882
-rw-r--r--active/CVE-2022-25902
-rw-r--r--active/CVE-2022-263732
-rw-r--r--active/CVE-2022-368792
-rw-r--r--active/CVE-2022-369462
8 files changed, 8 insertions, 8 deletions
diff --git a/active/CVE-2022-21505 b/active/CVE-2022-21505
index a4f0b576..d83b8b9a 100644
--- a/active/CVE-2022-21505
+++ b/active/CVE-2022-21505
@@ -11,6 +11,6 @@ Bugs:
upstream: released (5.19-rc8) [543ce63b664e2c2f9533d089a4664b559c3e6b5b]
5.10-upstream-stable: released (5.10.134) [ab5050fd7430dde3a9f073129036d3da3facc8ec]
4.19-upstream-stable: N/A "Vulnerable code introduced later"
-sid: pending (5.18.16-1)
+sid: released (5.18.16-1)
5.10-bullseye-security: needed
4.19-buster-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2022-2585 b/active/CVE-2022-2585
index 06e4315e..251c953f 100644
--- a/active/CVE-2022-2585
+++ b/active/CVE-2022-2585
@@ -7,6 +7,6 @@ Bugs:
upstream: needed
5.10-upstream-stable: needed
4.19-upstream-stable: N/A "Vulnerable code introduced later"
-sid: pending (5.18.16-1) [bugfix/all/posix-cpu-timers-Cleanup-CPU-timers-before-freeing-t.patch]
+sid: released (5.18.16-1) [bugfix/all/posix-cpu-timers-Cleanup-CPU-timers-before-freeing-t.patch]
5.10-bullseye-security: needed
4.19-buster-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2022-2586 b/active/CVE-2022-2586
index 9c097988..30dc4108 100644
--- a/active/CVE-2022-2586
+++ b/active/CVE-2022-2586
@@ -7,6 +7,6 @@ Bugs:
upstream: needed
5.10-upstream-stable: needed
4.19-upstream-stable: needed
-sid: pending (5.18.16-1) [bugfix/all/netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to-.patch]
+sid: released (5.18.16-1) [bugfix/all/netfilter-nf_tables-do-not-allow-SET_ID-to-refer-to-.patch]
5.10-bullseye-security: needed
4.19-buster-security: needed
diff --git a/active/CVE-2022-2588 b/active/CVE-2022-2588
index b7ff57ad..3a75a252 100644
--- a/active/CVE-2022-2588
+++ b/active/CVE-2022-2588
@@ -7,6 +7,6 @@ Bugs:
upstream: needed
5.10-upstream-stable: needed
4.19-upstream-stable: needed
-sid: pending (5.18.16-1) [bugfix/all/net_sched-cls_route-remove-from-list-when-handle-is-.patch]
+sid: released (5.18.16-1) [bugfix/all/net_sched-cls_route-remove-from-list-when-handle-is-.patch]
5.10-bullseye-security: needed
4.19-buster-security: needed
diff --git a/active/CVE-2022-2590 b/active/CVE-2022-2590
index 50567f2f..6ba1e54a 100644
--- a/active/CVE-2022-2590
+++ b/active/CVE-2022-2590
@@ -15,6 +15,6 @@ Bugs:
upstream: needed
5.10-upstream-stable: N/A "Vulnerable code introduced later"
4.19-upstream-stable: N/A "Vulnerable code introduced later"
-sid: pending (5.18.16-1) [bugfix/all/Revert-mm-shmem-unconditionally-set-pte-dirty-in-mfi.patch]
+sid: released (5.18.16-1) [bugfix/all/Revert-mm-shmem-unconditionally-set-pte-dirty-in-mfi.patch]
5.10-bullseye-security: N/A "Vulnerable code introduced later"
4.19-buster-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2022-26373 b/active/CVE-2022-26373
index 67861ead..16b9aa71 100644
--- a/active/CVE-2022-26373
+++ b/active/CVE-2022-26373
@@ -7,6 +7,6 @@ Bugs:
upstream: pending [2b1299322016731d56807aa49254a5ea3080b6b3, ba6e31af2be96c4d0536f2152ed6f7b6c11bca47]
5.10-upstream-stable: needed
4.19-upstream-stable: needed
-sid: pending (5.18.16-1) [bugfix/x86/pbrsb/0001-x86-speculation-Add-RSB-VM-Exit-protections.patch, bugfix/x86/pbrsb/0002-x86-speculation-Add-LFENCE-to-RSB-fill-sequence.patch]
+sid: released (5.18.16-1) [bugfix/x86/pbrsb/0001-x86-speculation-Add-RSB-VM-Exit-protections.patch, bugfix/x86/pbrsb/0002-x86-speculation-Add-LFENCE-to-RSB-fill-sequence.patch]
5.10-bullseye-security: needed
4.19-buster-security: needed
diff --git a/active/CVE-2022-36879 b/active/CVE-2022-36879
index c6938873..1db84ff0 100644
--- a/active/CVE-2022-36879
+++ b/active/CVE-2022-36879
@@ -6,6 +6,6 @@ Bugs:
upstream: released (5.19-rc8) [f85daf0e725358be78dfd208dea5fd665d8cb901]
5.10-upstream-stable: released (5.10.134) [47b696dd654450cdec3103a833e5bf29c4b83bfa]
4.19-upstream-stable: released (4.19.254) [fdb4fba1ba8512fa579a9d091dcb6c410f82f96a]
-sid: pending (5.18.16-1)
+sid: released (5.18.16-1)
5.10-bullseye-security: needed
4.19-buster-security: needed
diff --git a/active/CVE-2022-36946 b/active/CVE-2022-36946
index ec9c7cb6..99c895a8 100644
--- a/active/CVE-2022-36946
+++ b/active/CVE-2022-36946
@@ -9,6 +9,6 @@ Bugs:
upstream: released (5.19) [99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164]
5.10-upstream-stable: released (5.10.135) [440dccd80f627e0e11ceb0429e4cdab61857d17e]
4.19-upstream-stable: needed
-sid: pending (5.18.16-1)
+sid: released (5.18.16-1)
5.10-bullseye-security: needed
4.19-buster-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy