diff options
author | Ben Hutchings <ben@decadent.org.uk> | 2021-11-24 13:37:26 +0100 |
---|---|---|
committer | Ben Hutchings <ben@decadent.org.uk> | 2021-11-24 13:37:26 +0100 |
commit | 358ca3a4796e6be24ecc5dd2a1d52b9497a00f88 (patch) | |
tree | 56564d7478bcb0e73c1d730512e20313524fa257 /active | |
parent | 6e21e83f38ab2004fb45993695ed304e7158589e (diff) |
Mark issues pending for stretch
Diffstat (limited to 'active')
-rw-r--r-- | active/CVE-2020-16119 | 2 | ||||
-rw-r--r-- | active/CVE-2020-3702 | 2 | ||||
-rw-r--r-- | active/CVE-2021-0920 | 2 | ||||
-rw-r--r-- | active/CVE-2021-20321 | 2 | ||||
-rw-r--r-- | active/CVE-2021-20322 | 2 | ||||
-rw-r--r-- | active/CVE-2021-3612 | 2 | ||||
-rw-r--r-- | active/CVE-2021-3653 | 2 | ||||
-rw-r--r-- | active/CVE-2021-3655 | 2 | ||||
-rw-r--r-- | active/CVE-2021-3679 | 2 | ||||
-rw-r--r-- | active/CVE-2021-37159 | 2 | ||||
-rw-r--r-- | active/CVE-2021-3732 | 2 | ||||
-rw-r--r-- | active/CVE-2021-3753 | 2 | ||||
-rw-r--r-- | active/CVE-2021-3760 | 2 | ||||
-rw-r--r-- | active/CVE-2021-38160 | 2 | ||||
-rw-r--r-- | active/CVE-2021-38204 | 2 | ||||
-rw-r--r-- | active/CVE-2021-38205 | 2 | ||||
-rw-r--r-- | active/CVE-2021-40490 | 2 | ||||
-rw-r--r-- | active/CVE-2021-41864 | 2 | ||||
-rw-r--r-- | active/CVE-2021-42008 | 2 | ||||
-rw-r--r-- | active/CVE-2021-43389 | 2 |
20 files changed, 20 insertions, 20 deletions
diff --git a/active/CVE-2020-16119 b/active/CVE-2020-16119 index bd447bbc..4eae27d7 100644 --- a/active/CVE-2020-16119 +++ b/active/CVE-2020-16119 @@ -14,4 +14,4 @@ upstream: released (5.15-rc2) [d9ea761fdd197351890418acd462c51f241014a7] sid: released (5.14.6-1) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch] 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2020-3702 b/active/CVE-2020-3702 index 2d3eded8..c9db9499 100644 --- a/active/CVE-2020-3702 +++ b/active/CVE-2020-3702 @@ -12,4 +12,4 @@ upstream: released (5.12-rc1) [56c5485c9e444c2e85e11694b6c44f1338fc20fd, 73488cb sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ath-Use-safer-key-clearing-with-key-cache-entries.patch, bugfix/all/ath9k-Clear-key-cache-explicitly-on-disabling-hardwa.patch, bugfix/all/ath-Export-ath_hw_keysetmac.patch, bugfix/ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch, bugfix/all/ath9k-Postpone-key-cache-entry-deletion-for-TXQ-fram.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-0920 b/active/CVE-2021-0920 index 6691c4d6..6d5c467c 100644 --- a/active/CVE-2021-0920 +++ b/active/CVE-2021-0920 @@ -10,4 +10,4 @@ upstream: released (5.14-rc4) [cbcf01128d0a92e131bd09f1688fe032480b65ca] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-20321 b/active/CVE-2021-20321 index 245f24ab..ad21fbc0 100644 --- a/active/CVE-2021-20321 +++ b/active/CVE-2021-20321 @@ -10,4 +10,4 @@ upstream: released (5.15-rc5) [a295aef603e109a47af355477326bd41151765b6] sid: released (5.14.12-1) 5.10-bullseye-security: needed 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-20322 b/active/CVE-2021-20322 index 3b39a969..ba819cf0 100644 --- a/active/CVE-2021-20322 +++ b/active/CVE-2021-20322 @@ -24,4 +24,4 @@ upstream: released (5.14) [4785305c05b25a242e5314cc821f54ade4c18810, 6457378fe79 sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: needed -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-3612 b/active/CVE-2021-3612 index 51b3225a..4059d8f6 100644 --- a/active/CVE-2021-3612 +++ b/active/CVE-2021-3612 @@ -16,4 +16,4 @@ upstream: released (5.14-rc1) [f8f84af5da9ee04ef1d271528656dac42a090d00] sid: released (5.10.46-3) [bugfix/all/Input-joydev-prevent-use-of-not-validated-data-in-JS.patch] 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-3653 b/active/CVE-2021-3653 index afd463d1..a5abf065 100644 --- a/active/CVE-2021-3653 +++ b/active/CVE-2021-3653 @@ -10,4 +10,4 @@ upstream: released (5.14-rc7) [0f923e07124df069ba68d8bb12324398f4b6b709] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/x86/KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-3655 b/active/CVE-2021-3655 index 0e4fc7f7..d67cf99b 100644 --- a/active/CVE-2021-3655 +++ b/active/CVE-2021-3655 @@ -11,4 +11,4 @@ upstream: released (5.14-rc1) [0c5dc070ff3d6246d22ddd931f23a6266249e3db, 50619db sid: released (5.10.46-3) [bugfix/all/sctp-validate-from_addr_param-return.patch, bugfix/all/sctp-add-size-validation-when-walking-chunks.patch] 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-3679 b/active/CVE-2021-3679 index 53bcd0d7..901830b0 100644 --- a/active/CVE-2021-3679 +++ b/active/CVE-2021-3679 @@ -10,4 +10,4 @@ upstream: released (5.14-rc3) [67f0d6d9883c13174669f88adac4f0ee656cc16a] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-37159 b/active/CVE-2021-37159 index 3173ee13..e87545c3 100644 --- a/active/CVE-2021-37159 +++ b/active/CVE-2021-37159 @@ -22,4 +22,4 @@ upstream: released (5.14-rc3) [a6ecfb39ba9d7316057cea823b196b734f6b18ca] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: released (4.19.208-1) [bugfix/all/usb-hso-fix-error-handling-code-of-hso_create_net_de.patch] -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-3732 b/active/CVE-2021-3732 index abbb67f1..9f9f6fea 100644 --- a/active/CVE-2021-3732 +++ b/active/CVE-2021-3732 @@ -10,4 +10,4 @@ upstream: released (5.14-rc6) [427215d85e8d1476da1a86b8d67aceb485eb3631] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-3753 b/active/CVE-2021-3753 index 4b73110f..1ca34818 100644 --- a/active/CVE-2021-3753 +++ b/active/CVE-2021-3753 @@ -10,4 +10,4 @@ upstream: released (5.15-rc1) [2287a51ba822384834dafc1c798453375d1107c7] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/vt_kdsetmode-extend-console-locking.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-3760 b/active/CVE-2021-3760 index acbb2eb9..7c13164f 100644 --- a/active/CVE-2021-3760 +++ b/active/CVE-2021-3760 @@ -15,4 +15,4 @@ upstream: released (5.15-rc6) [1b1499a817c90fd1ce9453a2c98d2a01cca0e775] sid: released (5.14.16-1) 5.10-bullseye-security: needed 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-38160 b/active/CVE-2021-38160 index 32709f66..2672c223 100644 --- a/active/CVE-2021-38160 +++ b/active/CVE-2021-38160 @@ -9,4 +9,4 @@ upstream: released (5.14-rc1) [d00d8da5869a2608e97cfede094dfc5e11462a46] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/virtio_console-Assure-used-length-from-device-is-lim.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-38204 b/active/CVE-2021-38204 index 32b35297..149620f2 100644 --- a/active/CVE-2021-38204 +++ b/active/CVE-2021-38204 @@ -10,4 +10,4 @@ upstream: released (5.14-rc3) [b5fdf5c6e6bee35837e160c00ac89327bdad031b] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-38205 b/active/CVE-2021-38205 index a0eb978b..76baf676 100644 --- a/active/CVE-2021-38205 +++ b/active/CVE-2021-38205 @@ -10,4 +10,4 @@ upstream: released (5.14-rc1) [d0d62baa7f505bd4c59cd169692ff07ec49dde37] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-40490 b/active/CVE-2021-40490 index 8b6278ef..9d4efb3c 100644 --- a/active/CVE-2021-40490 +++ b/active/CVE-2021-40490 @@ -11,4 +11,4 @@ upstream: released (5.15-rc1) [a54c4613dac1500b40e4ab55199f7c51f028e848] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ext4-fix-race-writing-to-an-inline_data-file-while-i.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-41864 b/active/CVE-2021-41864 index 0862b5a7..139b815a 100644 --- a/active/CVE-2021-41864 +++ b/active/CVE-2021-41864 @@ -14,4 +14,4 @@ upstream: released (5.15-rc5) [30e29a9a2bc6a4888335a6ede968b75cd329657a] sid: released (5.14.12-1) 5.10-bullseye-security: needed 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-42008 b/active/CVE-2021-42008 index fd5baacc..b0678503 100644 --- a/active/CVE-2021-42008 +++ b/active/CVE-2021-42008 @@ -9,4 +9,4 @@ upstream: released (5.14-rc7) [19d1532a187669ce86d5a2696eb7275310070793] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) diff --git a/active/CVE-2021-43389 b/active/CVE-2021-43389 index e1675f2f..3b7b9841 100644 --- a/active/CVE-2021-43389 +++ b/active/CVE-2021-43389 @@ -14,4 +14,4 @@ upstream: released (5.15-rc6) [1f3e2e97c003f80c4b087092b225c8787ff91e4d] sid: released (5.14.16-1) 5.10-bullseye-security: needed 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.288-1) +4.9-stretch-security: pending (4.9.290-1) |