summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-06-15 07:26:43 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2020-06-15 07:26:43 +0200
commite33f586f31f8042b29511f3071182d0359ceca28 (patch)
treebd0e31f8f5802d0a78c989d2d2039629cec4e8ee
parent7df0f077161206c1a83d26c8b3eb1b8de4bd3b0a (diff)
Mark 5.8-rc1 released upstream
-rw-r--r--active/CVE-2019-194622
-rw-r--r--active/CVE-2020-05432
-rw-r--r--active/CVE-2020-107572
-rw-r--r--active/CVE-2020-107662
-rw-r--r--active/CVE-2020-107672
-rw-r--r--active/CVE-2020-107682
-rw-r--r--active/CVE-2020-128882
-rw-r--r--active/CVE-2020-139742
8 files changed, 8 insertions, 8 deletions
diff --git a/active/CVE-2019-19462 b/active/CVE-2019-19462
index 92b0e37e..14fd4745 100644
--- a/active/CVE-2019-19462
+++ b/active/CVE-2019-19462
@@ -10,7 +10,7 @@ Notes:
bwh> Introduced in 4.9 (not 4.10) by commit 017c59c042d0 "relay: Use per
bwh> CPU constructs for the relay channel buffer pointers".
Bugs:
-upstream: pending [54e200ab40fc14c863bcc80a51e20b7906608fce]
+upstream: released (5.8-rc1) [54e200ab40fc14c863bcc80a51e20b7906608fce]
4.19-upstream-stable: released (4.19.127) [8b5dfa53eeb6c8bba5a035d38f6f8b981aebb622]
4.9-upstream-stable: released (4.9.227) [d1774b0459875e2bf3e93b86294296e5494fd0b7]
3.16-upstream-stable: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2020-0543 b/active/CVE-2020-0543
index 2c388c3d..efe4ae1d 100644
--- a/active/CVE-2020-0543
+++ b/active/CVE-2020-0543
@@ -8,7 +8,7 @@ Notes:
bwh> to allow disabling the mitigation where it is unneeded.
bwh> Embargoed until 2020-06-09 17:00 UTC.
Bugs:
-upstream: pending (5.8-rc1) [e9d7144597b10ff13ff2264c059f7d4a7fbc89ac, 93920f61c2ad7edb01e63323832585796af75fc9, 7e5b3c267d256822407a22fdce6afdf9cd13f9fb, 7222a1b5b87417f22265c92deea76a6aecd0fb0f, 3798cc4d106e91382bfe016caa2edada27c2bb3f]
+upstream: released (5.8-rc1) [e9d7144597b10ff13ff2264c059f7d4a7fbc89ac, 93920f61c2ad7edb01e63323832585796af75fc9, 7e5b3c267d256822407a22fdce6afdf9cd13f9fb, 7222a1b5b87417f22265c92deea76a6aecd0fb0f, 3798cc4d106e91382bfe016caa2edada27c2bb3f]
4.19-upstream-stable: released (4.19.128) [253b9e7ac000154fc41b217660cb4c99f51e2ed0, 6682fe2fca22e45153e69f5b7ce7282bcba3565f, b65105dc4242f949cea9264851ff5e5473434a91, 00c2119c632e04948677a941cbad2427b0666046, 79623df18eacf685c1ee4a1c4c185b3b92eb1167]
4.9-upstream-stable: released (4.9.227) [5f8f40583aad4aa3c0fc8a9adaa9f1c988fa8e9e, 15cf7ca9f59ff911cd5582969377bbf8c2ecab8a, 2f93f8d6891c2bd3963e1c68ad3eabf4dd6a55af, 2808035ba55eb8aaaf5eb37421dbfff37c1f25a8, 4798f72395eb523d251f18226527329debe353e9]
3.16-upstream-stable: released (3.16.85) [bed86e750bb02981a5efe110b7e9ae3d989a2e73, 98a637c406eefe95f2428739c1397f250bb7fadd, 8c95356f8493c164c8878134d25f30cbd6d7ae5c, 0d314e817a11e62ab223b27166de0c6b3859e0e7, 948cfe9d8a2e3f0465340d5dea9d61f282df00e7]
diff --git a/active/CVE-2020-10757 b/active/CVE-2020-10757
index 3cbf659d..f4e68bb1 100644
--- a/active/CVE-2020-10757
+++ b/active/CVE-2020-10757
@@ -6,7 +6,7 @@ Notes:
carnil> Introduced in 5c7fb56e5e3f ("mm, dax: dax-pmd vs thp-pmd vs
carnil> hugetlbfs-pmd") in 4.5-rc1
Bugs:
-upstream: pending [5bfea2d9b17f1034a68147a8b03b9789af5700f9]
+upstream: released (5.8-rc1) [5bfea2d9b17f1034a68147a8b03b9789af5700f9]
4.19-upstream-stable: released (4.19.127) [78385480fd6572a83e7541e37658d9a7de6dc9b1]
4.9-upstream-stable: released (4.9.227) [c915cffda0a4329ee454646138fe2b11c5ba3cd6]
3.16-upstream-stable: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2020-10766 b/active/CVE-2020-10766
index 36176817..862f652f 100644
--- a/active/CVE-2020-10766
+++ b/active/CVE-2020-10766
@@ -7,7 +7,7 @@ Notes:
carnil> Commit fixes 5bfbe3ad5840 ("x86/speculation: Prepare for per
carnil> task indirect branch speculation control")
Bugs:
-upstream: pending [dbbe2ad02e9df26e372f38cc3e70dab9222c832e]
+upstream: released (5.8-rc1) [dbbe2ad02e9df26e372f38cc3e70dab9222c832e]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
diff --git a/active/CVE-2020-10767 b/active/CVE-2020-10767
index 6af82ac1..34160c9b 100644
--- a/active/CVE-2020-10767
+++ b/active/CVE-2020-10767
@@ -7,7 +7,7 @@ Notes:
carnil> Commit fixes 7cc765a67d8e ("x86/speculation: Enable prctl mode
carnil> for spectre_v2_user")
Bugs:
-upstream: pending [21998a351512eba4ed5969006f0c55882d995ada]
+upstream: released (5.8-rc1) [21998a351512eba4ed5969006f0c55882d995ada]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
diff --git a/active/CVE-2020-10768 b/active/CVE-2020-10768
index 305afac2..46d770c5 100644
--- a/active/CVE-2020-10768
+++ b/active/CVE-2020-10768
@@ -7,7 +7,7 @@ Notes:
carnil> Commit fixes 9137bb27e60e ("x86/speculation: Add prctl()
carnil> control for indirect branch speculation")
Bugs:
-upstream: pending [4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf]
+upstream: released (5.8-rc1) [4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
diff --git a/active/CVE-2020-12888 b/active/CVE-2020-12888
index f9d69d6f..991853c1 100644
--- a/active/CVE-2020-12888
+++ b/active/CVE-2020-12888
@@ -5,7 +5,7 @@ References:
https://lore.kernel.org/kvm/158871570274.15589.10563806532874116326.stgit@gimli.home/
Notes:
Bugs:
-upstream: pending [abafbc551fddede3e0a08dee1dcde08fc0eb8476]
+upstream: released (5.8-rc1) [abafbc551fddede3e0a08dee1dcde08fc0eb8476]
4.19-upstream-stable:
4.9-upstream-stable:
3.16-upstream-stable:
diff --git a/active/CVE-2020-13974 b/active/CVE-2020-13974
index 07c5849a..5adfd316 100644
--- a/active/CVE-2020-13974
+++ b/active/CVE-2020-13974
@@ -3,7 +3,7 @@ References:
https://lkml.org/lkml/2020/3/22/482
Notes:
Bugs:
-upstream: pending [b86dab054059b970111b5516ae548efaae5b3aae]
+upstream: released (5.8-rc1) [b86dab054059b970111b5516ae548efaae5b3aae]
4.19-upstream-stable: released (4.19.128) [18059925dbb6a7b6be1c0166ecca29d6b7977c9a]
4.9-upstream-stable: released (4.9.227) [adf823fa2a53db5d119d90817778f263a3a47608]
3.16-upstream-stable:

© 2014-2024 Faster IT GmbH | imprint | privacy policy