summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-03-10 07:47:53 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2022-03-10 07:47:53 +0100
commitb6002fae517f847e49dfaa0c119bab3f37b825ab (patch)
treecba9f25388cdf314cbb453c7496d7251b41c94de
parent7e1812928543306e6ab83060f51f6a9fd10c8702 (diff)
Mark 4.9.303-1 as released for stretch-security
-rw-r--r--active/CVE-2021-287112
-rw-r--r--active/CVE-2021-287122
-rw-r--r--active/CVE-2021-287132
-rw-r--r--active/CVE-2021-287142
-rw-r--r--active/CVE-2021-287152
-rw-r--r--active/CVE-2021-292642
-rw-r--r--active/CVE-2021-330332
-rw-r--r--active/CVE-2021-36402
-rw-r--r--active/CVE-2021-37522
-rw-r--r--active/CVE-2021-396852
-rw-r--r--active/CVE-2021-396862
-rw-r--r--active/CVE-2021-396982
-rw-r--r--active/CVE-2021-397142
-rw-r--r--active/CVE-2021-40022
-rw-r--r--active/CVE-2021-40832
-rw-r--r--active/CVE-2021-41552
-rw-r--r--active/CVE-2021-42022
-rw-r--r--active/CVE-2021-439762
-rw-r--r--active/CVE-2021-450952
-rw-r--r--active/CVE-2022-00012
-rw-r--r--active/CVE-2022-00022
-rw-r--r--active/CVE-2022-03302
-rw-r--r--active/CVE-2022-04352
-rw-r--r--active/CVE-2022-04872
-rw-r--r--active/CVE-2022-04922
-rw-r--r--active/CVE-2022-06172
-rw-r--r--active/CVE-2022-244482
-rw-r--r--active/CVE-2022-252582
-rw-r--r--active/CVE-2022-253752
29 files changed, 29 insertions, 29 deletions
diff --git a/active/CVE-2021-28711 b/active/CVE-2021-28711
index be8c6e38..d5df5134 100644
--- a/active/CVE-2021-28711
+++ b/active/CVE-2021-28711
@@ -12,4 +12,4 @@ upstream: released (5.16-rc7) [0fd08a34e8e3b67ec9bd8287ac0facf8374b844a]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-28712 b/active/CVE-2021-28712
index 751656c0..de8b6230 100644
--- a/active/CVE-2021-28712
+++ b/active/CVE-2021-28712
@@ -12,4 +12,4 @@ upstream: released (5.16-rc7) [b27d47950e481f292c0a5ad57357edb9d95d03ba]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-28713 b/active/CVE-2021-28713
index 559834cd..84225079 100644
--- a/active/CVE-2021-28713
+++ b/active/CVE-2021-28713
@@ -12,4 +12,4 @@ upstream: released (5.16-rc7) [fe415186b43df0db1f17fa3a46275fd92107fe71]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-28714 b/active/CVE-2021-28714
index 036b2d3f..d6d8c567 100644
--- a/active/CVE-2021-28714
+++ b/active/CVE-2021-28714
@@ -14,4 +14,4 @@ upstream: released (5.16-rc7) [6032046ec4b70176d247a71836186d47b25d1684]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-28715 b/active/CVE-2021-28715
index f9298265..27309792 100644
--- a/active/CVE-2021-28715
+++ b/active/CVE-2021-28715
@@ -14,4 +14,4 @@ upstream: released (5.16-rc7) [be81992f9086b230623ae3ebbc85ecee4d00a3d3]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-29264 b/active/CVE-2021-29264
index 54f62b59..14e831ba 100644
--- a/active/CVE-2021-29264
+++ b/active/CVE-2021-29264
@@ -12,4 +12,4 @@ upstream: released (5.12-rc3) [d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f]
sid: released (5.10.28-1)
5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.194-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-33033 b/active/CVE-2021-33033
index b0cb21a7..ce1e7319 100644
--- a/active/CVE-2021-33033
+++ b/active/CVE-2021-33033
@@ -19,4 +19,4 @@ upstream: released (5.12-rc7) [ad5d07f4a9cd671233ae20983848874731102c08]
sid: released (5.10.24-1)
5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.181-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-3640 b/active/CVE-2021-3640
index 0eb120c0..9442849a 100644
--- a/active/CVE-2021-3640
+++ b/active/CVE-2021-3640
@@ -19,4 +19,4 @@ upstream: released (5.16-rc1) [99c23da0eed4fd20cae8243f2b51e10e66aa0951]
sid: released (5.15.3-1)
5.10-bullseye-security: released (5.10.84-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-3752 b/active/CVE-2021-3752
index e82167af..dd73c677 100644
--- a/active/CVE-2021-3752
+++ b/active/CVE-2021-3752
@@ -15,4 +15,4 @@ upstream: released (5.16-rc1) [1bff51ea59a9afb67d2dd78518ab0582a54a472c]
sid: released (5.15.3-1)
5.10-bullseye-security: released (5.10.84-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-39685 b/active/CVE-2021-39685
index e1a64940..5229b871 100644
--- a/active/CVE-2021-39685
+++ b/active/CVE-2021-39685
@@ -11,4 +11,4 @@ upstream: released (5.16-rc5) [153a2d7e3350cc89d406ba2d35be8793a64c2038, 86ebbc1
sid: released (5.15.5-2) [bugfix/all/USB-gadget-detect-too-big-endpoint-0-requests.patch, bugfix/all/USB-gadget-zero-allocate-endpoint-0-buffers.patch]
5.10-bullseye-security: released (5.10.92-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-39686 b/active/CVE-2021-39686
index 2768086a..866327d4 100644
--- a/active/CVE-2021-39686
+++ b/active/CVE-2021-39686
@@ -10,4 +10,4 @@ upstream: released (5.16-rc1) [29bc22ac5e5bc63275e850f0c8fc549e3d0e306b, 52f8869
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.84-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-39698 b/active/CVE-2021-39698
index 03aea622..1cd1d5fb 100644
--- a/active/CVE-2021-39698
+++ b/active/CVE-2021-39698
@@ -10,4 +10,4 @@ upstream: released (5.16-rc5) [42288cb44c4b5fff7653bc392b583a2b8bd6a8c0, a880b28
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-39714 b/active/CVE-2021-39714
index 33437dfd..52109ef2 100644
--- a/active/CVE-2021-39714
+++ b/active/CVE-2021-39714
@@ -13,4 +13,4 @@ upstream: released (4.12-rc1) [e3b914bc7eb6bcecc5b597ee6e31fc40442c291f]
sid: released (4.12.6-1)
5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: N/A "Fixed before branching point"
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-4002 b/active/CVE-2021-4002
index 10f43ce2..307fe96a 100644
--- a/active/CVE-2021-4002
+++ b/active/CVE-2021-4002
@@ -13,4 +13,4 @@ upstream: released (5.16-rc3) [a4a118f2eead1d6c49e00765de89878288d4b890]
sid: released (5.15.5-1)
5.10-bullseye-security: released (5.10.84-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-4083 b/active/CVE-2021-4083
index 217a1ddc..f451d2f5 100644
--- a/active/CVE-2021-4083
+++ b/active/CVE-2021-4083
@@ -11,4 +11,4 @@ upstream: released (5.16-rc4) [054aa8d439b9185d4f5eb9a90282d1ce74772969]
sid: released (5.15.5-2) [bugfix/all/fget-check-that-the-fd-still-exists-after-getting-a-.patch]
5.10-bullseye-security: released (5.10.84-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-4155 b/active/CVE-2021-4155
index ab4c9c69..932a7f33 100644
--- a/active/CVE-2021-4155
+++ b/active/CVE-2021-4155
@@ -12,4 +12,4 @@ upstream: released (5.16) [983d8e60f50806f90534cc5373d0ce867e5aaf79]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-4202 b/active/CVE-2021-4202
index dda54ee0..95ef54c0 100644
--- a/active/CVE-2021-4202
+++ b/active/CVE-2021-4202
@@ -11,4 +11,4 @@ upstream: released (5.16-rc2) [86cdf8e38792545161dbe3350a7eced558ba4d15, 48b71a9
sid: released (5.15.5-1)
5.10-bullseye-security: released (5.10.84-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-43976 b/active/CVE-2021-43976
index 227b01ef..8c5e07d0 100644
--- a/active/CVE-2021-43976
+++ b/active/CVE-2021-43976
@@ -12,4 +12,4 @@ upstream: released (5.17-rc1) [04d80663f67ccef893061b49ec8a42ff7045ae84]
sid: released (5.15.15-2) [bugfix/x86/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch]
5.10-bullseye-security: released (5.10.92-2) [bugfix/x86/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch]
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2021-45095 b/active/CVE-2021-45095
index f5eca079..e52acc95 100644
--- a/active/CVE-2021-45095
+++ b/active/CVE-2021-45095
@@ -11,4 +11,4 @@ upstream: released (5.16-rc6) [bcd0f93353326954817a4f9fa55ec57fb38acbb0]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2022-0001 b/active/CVE-2022-0001
index 8d4b10e7..ab6b900d 100644
--- a/active/CVE-2022-0001
+++ b/active/CVE-2022-0001
@@ -12,4 +12,4 @@ upstream: pending [d45476d9832409371537013ebdd8dc1a7781f97a, 1e19da8522c81bf46b3
sid: released (5.16.12-1) [bugfix/x86/bhb/0001-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0002-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0003-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0004-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0005-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0006-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0007-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0008-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch]
5.10-bullseye-security: released (5.10.103-1) [bugfix/x86/bhb/0002-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0003-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0004-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0005-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0006-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0007-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0008-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0009-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch]
4.19-buster-security: released (4.19.232-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch]
-4.9-stretch-security: pending (4.9.303-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch]
+4.9-stretch-security: released (4.9.303-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch]
diff --git a/active/CVE-2022-0002 b/active/CVE-2022-0002
index a7aa8faf..152b1cb4 100644
--- a/active/CVE-2022-0002
+++ b/active/CVE-2022-0002
@@ -14,4 +14,4 @@ upstream: pending [d45476d9832409371537013ebdd8dc1a7781f97a, 1e19da8522c81bf46b3
sid: released (5.16.12-1) [bugfix/x86/bhb/0001-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0002-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0003-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0004-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0005-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0006-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0007-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0008-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch]
5.10-bullseye-security: released (5.10.103-1) [bugfix/x86/bhb/0002-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0003-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0004-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0005-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0006-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0007-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0008-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0009-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch]
4.19-buster-security: released (4.19.232-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch]
-4.9-stretch-security: pending (4.9.303-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch]
+4.9-stretch-security: released (4.9.303-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch]
diff --git a/active/CVE-2022-0330 b/active/CVE-2022-0330
index 1a5f815e..806ddbbe 100644
--- a/active/CVE-2022-0330
+++ b/active/CVE-2022-0330
@@ -11,4 +11,4 @@ upstream: released (5.17-rc2) [7938d61591d33394a21bdd7797a245b65428f44c]
sid: released (5.15.15-2) [bugfix/x86/drm-i915-Flush-TLBs-before-releasing-backing-store.patch]
5.10-bullseye-security: released (5.10.92-2) [bugfix/x86/drm-i915-Flush-TLBs-before-releasing-backing-store.patch]
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2022-0435 b/active/CVE-2022-0435
index 8a12bfbc..5495d3cf 100644
--- a/active/CVE-2022-0435
+++ b/active/CVE-2022-0435
@@ -13,4 +13,4 @@ upstream: released (5.17-rc4) [9aa422ad326634b76309e8ff342c246800621216]
sid: released (5.16.10-1)
5.10-bullseye-security: released (5.10.92-2) [bugfix/all/tipc-improve-size-validations-for-received-domain-re.patch]
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2022-0487 b/active/CVE-2022-0487
index 97156499..5194a44d 100644
--- a/active/CVE-2022-0487
+++ b/active/CVE-2022-0487
@@ -13,4 +13,4 @@ upstream: released (5.17-rc4) [bd2db32e7c3e35bd4d9b8bbff689434a50893546]
sid: released (5.16.10-1)
5.10-bullseye-security: released (5.10.103-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2022-0492 b/active/CVE-2022-0492
index b77e531e..bf08c11e 100644
--- a/active/CVE-2022-0492
+++ b/active/CVE-2022-0492
@@ -14,4 +14,4 @@ upstream: released (5.17-rc3) [24f6008564183aa120d07c03d9289519c2fe02af]
sid: released (5.16.7-1)
5.10-bullseye-security: released (5.10.103-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2022-0617 b/active/CVE-2022-0617
index a499a62e..fb1e3316 100644
--- a/active/CVE-2022-0617
+++ b/active/CVE-2022-0617
@@ -10,4 +10,4 @@ upstream: released (5.17-rc2) [7fc3b7c2981bbd1047916ade327beccb90994eee, ea85691
sid: released (5.16.7-1)
5.10-bullseye-security: released (5.10.103-1)
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2022-24448 b/active/CVE-2022-24448
index c4d5c68f..3081a0fd 100644
--- a/active/CVE-2022-24448
+++ b/active/CVE-2022-24448
@@ -10,4 +10,4 @@ upstream: released (5.17-rc2) [ac795161c93699d600db16c1a8cc23a65a1eceaf]
sid: released (5.16.7-1)
5.10-bullseye-security: released (5.10.92-2) [bugfix/all/NFSv4-Handle-case-where-the-lookup-of-a-directory-fa.patch]
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2022-25258 b/active/CVE-2022-25258
index 8880d8e8..c6034e00 100644
--- a/active/CVE-2022-25258
+++ b/active/CVE-2022-25258
@@ -10,4 +10,4 @@ upstream: released (5.17-rc4) [75e5b4849b81e19e9efe1654b30d7f3151c33c2c]
sid: released (5.16.10-1)
5.10-bullseye-security: released (5.10.92-2) [bugfix/all/USB-gadget-validate-interface-OS-descriptor-requests.patch]
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)
diff --git a/active/CVE-2022-25375 b/active/CVE-2022-25375
index ff8438ab..e9b29ca0 100644
--- a/active/CVE-2022-25375
+++ b/active/CVE-2022-25375
@@ -11,4 +11,4 @@ upstream: released (5.17-rc4) [38ea1eac7d88072bbffb630e2b3db83ca649b826]
sid: released (5.16.10-1)
5.10-bullseye-security: released (5.10.92-2) [bugfix/all/usb-gadget-rndis-check-size-of-RNDIS_MSG_SET-command.patch]
4.19-buster-security: released (4.19.232-1)
-4.9-stretch-security: pending (4.9.303-1)
+4.9-stretch-security: released (4.9.303-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy