diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2022-03-10 07:47:53 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2022-03-10 07:47:53 +0100 |
commit | b6002fae517f847e49dfaa0c119bab3f37b825ab (patch) | |
tree | cba9f25388cdf314cbb453c7496d7251b41c94de | |
parent | 7e1812928543306e6ab83060f51f6a9fd10c8702 (diff) |
Mark 4.9.303-1 as released for stretch-security
-rw-r--r-- | active/CVE-2021-28711 | 2 | ||||
-rw-r--r-- | active/CVE-2021-28712 | 2 | ||||
-rw-r--r-- | active/CVE-2021-28713 | 2 | ||||
-rw-r--r-- | active/CVE-2021-28714 | 2 | ||||
-rw-r--r-- | active/CVE-2021-28715 | 2 | ||||
-rw-r--r-- | active/CVE-2021-29264 | 2 | ||||
-rw-r--r-- | active/CVE-2021-33033 | 2 | ||||
-rw-r--r-- | active/CVE-2021-3640 | 2 | ||||
-rw-r--r-- | active/CVE-2021-3752 | 2 | ||||
-rw-r--r-- | active/CVE-2021-39685 | 2 | ||||
-rw-r--r-- | active/CVE-2021-39686 | 2 | ||||
-rw-r--r-- | active/CVE-2021-39698 | 2 | ||||
-rw-r--r-- | active/CVE-2021-39714 | 2 | ||||
-rw-r--r-- | active/CVE-2021-4002 | 2 | ||||
-rw-r--r-- | active/CVE-2021-4083 | 2 | ||||
-rw-r--r-- | active/CVE-2021-4155 | 2 | ||||
-rw-r--r-- | active/CVE-2021-4202 | 2 | ||||
-rw-r--r-- | active/CVE-2021-43976 | 2 | ||||
-rw-r--r-- | active/CVE-2021-45095 | 2 | ||||
-rw-r--r-- | active/CVE-2022-0001 | 2 | ||||
-rw-r--r-- | active/CVE-2022-0002 | 2 | ||||
-rw-r--r-- | active/CVE-2022-0330 | 2 | ||||
-rw-r--r-- | active/CVE-2022-0435 | 2 | ||||
-rw-r--r-- | active/CVE-2022-0487 | 2 | ||||
-rw-r--r-- | active/CVE-2022-0492 | 2 | ||||
-rw-r--r-- | active/CVE-2022-0617 | 2 | ||||
-rw-r--r-- | active/CVE-2022-24448 | 2 | ||||
-rw-r--r-- | active/CVE-2022-25258 | 2 | ||||
-rw-r--r-- | active/CVE-2022-25375 | 2 |
29 files changed, 29 insertions, 29 deletions
diff --git a/active/CVE-2021-28711 b/active/CVE-2021-28711 index be8c6e38..d5df5134 100644 --- a/active/CVE-2021-28711 +++ b/active/CVE-2021-28711 @@ -12,4 +12,4 @@ upstream: released (5.16-rc7) [0fd08a34e8e3b67ec9bd8287ac0facf8374b844a] sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-28712 b/active/CVE-2021-28712 index 751656c0..de8b6230 100644 --- a/active/CVE-2021-28712 +++ b/active/CVE-2021-28712 @@ -12,4 +12,4 @@ upstream: released (5.16-rc7) [b27d47950e481f292c0a5ad57357edb9d95d03ba] sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-28713 b/active/CVE-2021-28713 index 559834cd..84225079 100644 --- a/active/CVE-2021-28713 +++ b/active/CVE-2021-28713 @@ -12,4 +12,4 @@ upstream: released (5.16-rc7) [fe415186b43df0db1f17fa3a46275fd92107fe71] sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-28714 b/active/CVE-2021-28714 index 036b2d3f..d6d8c567 100644 --- a/active/CVE-2021-28714 +++ b/active/CVE-2021-28714 @@ -14,4 +14,4 @@ upstream: released (5.16-rc7) [6032046ec4b70176d247a71836186d47b25d1684] sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-28715 b/active/CVE-2021-28715 index f9298265..27309792 100644 --- a/active/CVE-2021-28715 +++ b/active/CVE-2021-28715 @@ -14,4 +14,4 @@ upstream: released (5.16-rc7) [be81992f9086b230623ae3ebbc85ecee4d00a3d3] sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-29264 b/active/CVE-2021-29264 index 54f62b59..14e831ba 100644 --- a/active/CVE-2021-29264 +++ b/active/CVE-2021-29264 @@ -12,4 +12,4 @@ upstream: released (5.12-rc3) [d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f] sid: released (5.10.28-1) 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.194-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-33033 b/active/CVE-2021-33033 index b0cb21a7..ce1e7319 100644 --- a/active/CVE-2021-33033 +++ b/active/CVE-2021-33033 @@ -19,4 +19,4 @@ upstream: released (5.12-rc7) [ad5d07f4a9cd671233ae20983848874731102c08] sid: released (5.10.24-1) 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.181-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-3640 b/active/CVE-2021-3640 index 0eb120c0..9442849a 100644 --- a/active/CVE-2021-3640 +++ b/active/CVE-2021-3640 @@ -19,4 +19,4 @@ upstream: released (5.16-rc1) [99c23da0eed4fd20cae8243f2b51e10e66aa0951] sid: released (5.15.3-1) 5.10-bullseye-security: released (5.10.84-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-3752 b/active/CVE-2021-3752 index e82167af..dd73c677 100644 --- a/active/CVE-2021-3752 +++ b/active/CVE-2021-3752 @@ -15,4 +15,4 @@ upstream: released (5.16-rc1) [1bff51ea59a9afb67d2dd78518ab0582a54a472c] sid: released (5.15.3-1) 5.10-bullseye-security: released (5.10.84-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-39685 b/active/CVE-2021-39685 index e1a64940..5229b871 100644 --- a/active/CVE-2021-39685 +++ b/active/CVE-2021-39685 @@ -11,4 +11,4 @@ upstream: released (5.16-rc5) [153a2d7e3350cc89d406ba2d35be8793a64c2038, 86ebbc1 sid: released (5.15.5-2) [bugfix/all/USB-gadget-detect-too-big-endpoint-0-requests.patch, bugfix/all/USB-gadget-zero-allocate-endpoint-0-buffers.patch] 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-39686 b/active/CVE-2021-39686 index 2768086a..866327d4 100644 --- a/active/CVE-2021-39686 +++ b/active/CVE-2021-39686 @@ -10,4 +10,4 @@ upstream: released (5.16-rc1) [29bc22ac5e5bc63275e850f0c8fc549e3d0e306b, 52f8869 sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.84-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-39698 b/active/CVE-2021-39698 index 03aea622..1cd1d5fb 100644 --- a/active/CVE-2021-39698 +++ b/active/CVE-2021-39698 @@ -10,4 +10,4 @@ upstream: released (5.16-rc5) [42288cb44c4b5fff7653bc392b583a2b8bd6a8c0, a880b28 sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-39714 b/active/CVE-2021-39714 index 33437dfd..52109ef2 100644 --- a/active/CVE-2021-39714 +++ b/active/CVE-2021-39714 @@ -13,4 +13,4 @@ upstream: released (4.12-rc1) [e3b914bc7eb6bcecc5b597ee6e31fc40442c291f] sid: released (4.12.6-1) 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: N/A "Fixed before branching point" -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-4002 b/active/CVE-2021-4002 index 10f43ce2..307fe96a 100644 --- a/active/CVE-2021-4002 +++ b/active/CVE-2021-4002 @@ -13,4 +13,4 @@ upstream: released (5.16-rc3) [a4a118f2eead1d6c49e00765de89878288d4b890] sid: released (5.15.5-1) 5.10-bullseye-security: released (5.10.84-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-4083 b/active/CVE-2021-4083 index 217a1ddc..f451d2f5 100644 --- a/active/CVE-2021-4083 +++ b/active/CVE-2021-4083 @@ -11,4 +11,4 @@ upstream: released (5.16-rc4) [054aa8d439b9185d4f5eb9a90282d1ce74772969] sid: released (5.15.5-2) [bugfix/all/fget-check-that-the-fd-still-exists-after-getting-a-.patch] 5.10-bullseye-security: released (5.10.84-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-4155 b/active/CVE-2021-4155 index ab4c9c69..932a7f33 100644 --- a/active/CVE-2021-4155 +++ b/active/CVE-2021-4155 @@ -12,4 +12,4 @@ upstream: released (5.16) [983d8e60f50806f90534cc5373d0ce867e5aaf79] sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-4202 b/active/CVE-2021-4202 index dda54ee0..95ef54c0 100644 --- a/active/CVE-2021-4202 +++ b/active/CVE-2021-4202 @@ -11,4 +11,4 @@ upstream: released (5.16-rc2) [86cdf8e38792545161dbe3350a7eced558ba4d15, 48b71a9 sid: released (5.15.5-1) 5.10-bullseye-security: released (5.10.84-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-43976 b/active/CVE-2021-43976 index 227b01ef..8c5e07d0 100644 --- a/active/CVE-2021-43976 +++ b/active/CVE-2021-43976 @@ -12,4 +12,4 @@ upstream: released (5.17-rc1) [04d80663f67ccef893061b49ec8a42ff7045ae84] sid: released (5.15.15-2) [bugfix/x86/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch] 5.10-bullseye-security: released (5.10.92-2) [bugfix/x86/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch] 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2021-45095 b/active/CVE-2021-45095 index f5eca079..e52acc95 100644 --- a/active/CVE-2021-45095 +++ b/active/CVE-2021-45095 @@ -11,4 +11,4 @@ upstream: released (5.16-rc6) [bcd0f93353326954817a4f9fa55ec57fb38acbb0] sid: released (5.15.15-1) 5.10-bullseye-security: released (5.10.92-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2022-0001 b/active/CVE-2022-0001 index 8d4b10e7..ab6b900d 100644 --- a/active/CVE-2022-0001 +++ b/active/CVE-2022-0001 @@ -12,4 +12,4 @@ upstream: pending [d45476d9832409371537013ebdd8dc1a7781f97a, 1e19da8522c81bf46b3 sid: released (5.16.12-1) [bugfix/x86/bhb/0001-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0002-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0003-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0004-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0005-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0006-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0007-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0008-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch] 5.10-bullseye-security: released (5.10.103-1) [bugfix/x86/bhb/0002-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0003-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0004-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0005-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0006-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0007-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0008-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0009-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch] 4.19-buster-security: released (4.19.232-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch] -4.9-stretch-security: pending (4.9.303-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch] +4.9-stretch-security: released (4.9.303-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch] diff --git a/active/CVE-2022-0002 b/active/CVE-2022-0002 index a7aa8faf..152b1cb4 100644 --- a/active/CVE-2022-0002 +++ b/active/CVE-2022-0002 @@ -14,4 +14,4 @@ upstream: pending [d45476d9832409371537013ebdd8dc1a7781f97a, 1e19da8522c81bf46b3 sid: released (5.16.12-1) [bugfix/x86/bhb/0001-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0002-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0003-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0004-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0005-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0006-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0007-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0008-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch] 5.10-bullseye-security: released (5.10.103-1) [bugfix/x86/bhb/0002-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0003-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0004-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0005-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0006-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0007-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0008-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0009-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch] 4.19-buster-security: released (4.19.232-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch] -4.9-stretch-security: pending (4.9.303-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch] +4.9-stretch-security: released (4.9.303-1) [bugfix/x86/bhb/0004-x86-speculation-Rename-RETPOLINE_AMD-to-RETPOLINE_LF.patch, bugfix/x86/bhb/0005-x86-speculation-Add-eIBRS-Retpoline-options.patch, bugfix/x86/bhb/0006-Documentation-hw-vuln-Update-spectre-doc.patch, bugfix/x86/bhb/0007-x86-speculation-Include-unprivileged-eBPF-status-in-.patch, bugfix/x86/bhb/0008-x86-speculation-Use-generic-retpoline-by-default-on-.patch, bugfix/x86/bhb/0009-x86-speculation-Update-link-to-AMD-speculation-white.patch, bugfix/x86/bhb/0010-x86-speculation-Warn-about-Spectre-v2-LFENCE-mitigat.patch, bugfix/x86/bhb/0011-x86-speculation-Warn-about-eIBRS-LFENCE-Unprivileged.patch] diff --git a/active/CVE-2022-0330 b/active/CVE-2022-0330 index 1a5f815e..806ddbbe 100644 --- a/active/CVE-2022-0330 +++ b/active/CVE-2022-0330 @@ -11,4 +11,4 @@ upstream: released (5.17-rc2) [7938d61591d33394a21bdd7797a245b65428f44c] sid: released (5.15.15-2) [bugfix/x86/drm-i915-Flush-TLBs-before-releasing-backing-store.patch] 5.10-bullseye-security: released (5.10.92-2) [bugfix/x86/drm-i915-Flush-TLBs-before-releasing-backing-store.patch] 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2022-0435 b/active/CVE-2022-0435 index 8a12bfbc..5495d3cf 100644 --- a/active/CVE-2022-0435 +++ b/active/CVE-2022-0435 @@ -13,4 +13,4 @@ upstream: released (5.17-rc4) [9aa422ad326634b76309e8ff342c246800621216] sid: released (5.16.10-1) 5.10-bullseye-security: released (5.10.92-2) [bugfix/all/tipc-improve-size-validations-for-received-domain-re.patch] 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2022-0487 b/active/CVE-2022-0487 index 97156499..5194a44d 100644 --- a/active/CVE-2022-0487 +++ b/active/CVE-2022-0487 @@ -13,4 +13,4 @@ upstream: released (5.17-rc4) [bd2db32e7c3e35bd4d9b8bbff689434a50893546] sid: released (5.16.10-1) 5.10-bullseye-security: released (5.10.103-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2022-0492 b/active/CVE-2022-0492 index b77e531e..bf08c11e 100644 --- a/active/CVE-2022-0492 +++ b/active/CVE-2022-0492 @@ -14,4 +14,4 @@ upstream: released (5.17-rc3) [24f6008564183aa120d07c03d9289519c2fe02af] sid: released (5.16.7-1) 5.10-bullseye-security: released (5.10.103-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2022-0617 b/active/CVE-2022-0617 index a499a62e..fb1e3316 100644 --- a/active/CVE-2022-0617 +++ b/active/CVE-2022-0617 @@ -10,4 +10,4 @@ upstream: released (5.17-rc2) [7fc3b7c2981bbd1047916ade327beccb90994eee, ea85691 sid: released (5.16.7-1) 5.10-bullseye-security: released (5.10.103-1) 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2022-24448 b/active/CVE-2022-24448 index c4d5c68f..3081a0fd 100644 --- a/active/CVE-2022-24448 +++ b/active/CVE-2022-24448 @@ -10,4 +10,4 @@ upstream: released (5.17-rc2) [ac795161c93699d600db16c1a8cc23a65a1eceaf] sid: released (5.16.7-1) 5.10-bullseye-security: released (5.10.92-2) [bugfix/all/NFSv4-Handle-case-where-the-lookup-of-a-directory-fa.patch] 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2022-25258 b/active/CVE-2022-25258 index 8880d8e8..c6034e00 100644 --- a/active/CVE-2022-25258 +++ b/active/CVE-2022-25258 @@ -10,4 +10,4 @@ upstream: released (5.17-rc4) [75e5b4849b81e19e9efe1654b30d7f3151c33c2c] sid: released (5.16.10-1) 5.10-bullseye-security: released (5.10.92-2) [bugfix/all/USB-gadget-validate-interface-OS-descriptor-requests.patch] 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) diff --git a/active/CVE-2022-25375 b/active/CVE-2022-25375 index ff8438ab..e9b29ca0 100644 --- a/active/CVE-2022-25375 +++ b/active/CVE-2022-25375 @@ -11,4 +11,4 @@ upstream: released (5.17-rc4) [38ea1eac7d88072bbffb630e2b3db83ca649b826] sid: released (5.16.10-1) 5.10-bullseye-security: released (5.10.92-2) [bugfix/all/usb-gadget-rndis-check-size-of-RNDIS_MSG_SET-command.patch] 4.19-buster-security: released (4.19.232-1) -4.9-stretch-security: pending (4.9.303-1) +4.9-stretch-security: released (4.9.303-1) |