summaryrefslogtreecommitdiffstats
path: root/active
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2022-03-07 15:54:32 +0100
committerBen Hutchings <ben@decadent.org.uk>2022-03-07 15:54:32 +0100
commitb4713a59b639804ce5b16e7690503febe0b64f27 (patch)
tree78b24eb4ec818c3c9090806e3e6e06bff3315f61 /active
parent1193426ecbf84de0a76dd9295f3817ef04d90ac8 (diff)
Mark issues pending for buster and bullseye after stable updates
Diffstat (limited to 'active')
-rw-r--r--active/CVE-2020-363102
-rw-r--r--active/CVE-2020-363222
-rw-r--r--active/CVE-2021-203172
-rw-r--r--active/CVE-2021-203212
-rw-r--r--active/CVE-2021-203222
-rw-r--r--active/CVE-2021-226002
-rw-r--r--active/CVE-2021-287112
-rw-r--r--active/CVE-2021-287122
-rw-r--r--active/CVE-2021-287132
-rw-r--r--active/CVE-2021-287142
-rw-r--r--active/CVE-2021-287152
-rw-r--r--active/CVE-2021-289502
-rw-r--r--active/CVE-2021-36402
-rw-r--r--active/CVE-2021-37442
-rw-r--r--active/CVE-2021-37522
-rw-r--r--active/CVE-2021-37602
-rw-r--r--active/CVE-2021-37642
-rw-r--r--active/CVE-2021-37722
-rw-r--r--active/CVE-2021-383002
-rw-r--r--active/CVE-2021-38942
-rw-r--r--active/CVE-2021-396852
-rw-r--r--active/CVE-2021-40022
-rw-r--r--active/CVE-2021-40832
-rw-r--r--active/CVE-2021-41352
-rw-r--r--active/CVE-2021-41552
-rw-r--r--active/CVE-2021-418642
-rw-r--r--active/CVE-2021-42022
-rw-r--r--active/CVE-2021-42032
-rw-r--r--active/CVE-2021-427392
-rw-r--r--active/CVE-2021-433892
-rw-r--r--active/CVE-2021-439752
-rw-r--r--active/CVE-2021-439762
-rw-r--r--active/CVE-2021-447332
-rw-r--r--active/CVE-2021-450952
-rw-r--r--active/CVE-2021-454692
-rw-r--r--active/CVE-2021-454802
-rw-r--r--active/CVE-2022-03222
-rw-r--r--active/CVE-2022-03302
-rw-r--r--active/CVE-2022-04352
-rw-r--r--active/CVE-2022-04872
-rw-r--r--active/CVE-2022-04924
-rw-r--r--active/CVE-2022-06174
-rw-r--r--active/CVE-2022-06442
-rw-r--r--active/CVE-2022-229422
-rw-r--r--active/CVE-2022-244482
-rw-r--r--active/CVE-2022-249592
-rw-r--r--active/CVE-2022-252582
-rw-r--r--active/CVE-2022-253752
-rw-r--r--active/CVE-2022-256362
49 files changed, 51 insertions, 51 deletions
diff --git a/active/CVE-2020-36310 b/active/CVE-2020-36310
index 95353234..be2984b5 100644
--- a/active/CVE-2020-36310
+++ b/active/CVE-2020-36310
@@ -12,6 +12,6 @@ upstream: released (5.17-rc2) [55467fcd55b89c622e62b4afe60ac0eb2fae91f2]
4.19-upstream-stable: needed
4.9-upstream-stable: N/A "Vulnerability introduced later"
sid: released (5.16.7-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.103-1)
4.19-buster-security: needed
4.9-stretch-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2020-36322 b/active/CVE-2020-36322
index 9490d7e4..4c57520d 100644
--- a/active/CVE-2020-36322
+++ b/active/CVE-2020-36322
@@ -12,5 +12,5 @@ upstream: released (5.11-rc1) [5d069dbe8aaf2a197142558b6fb2978189ba3454]
4.9-upstream-stable: released (4.9.298) [3a2f8823aa565cc67bdd00c4cd5e1d8ad81e8436]
sid: released (5.10.9-1)
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.272-1) [bugfix/all/fuse-fix-bad-inode.patch]
diff --git a/active/CVE-2021-20317 b/active/CVE-2021-20317
index aaf647a9..680dfb7a 100644
--- a/active/CVE-2021-20317
+++ b/active/CVE-2021-20317
@@ -13,5 +13,5 @@ upstream: released (5.4-rc1) [511885d7061eda3eb1faf3f57dcc936ff75863f1]
4.9-upstream-stable: released (4.9.298) [ef2e64035f074bfeef14c28347aaec0b486a9e9f]
sid: released (5.4.6-1)
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.290-1) [bugfix/all/lib-timerqueue-rely-on-rbtree-semantics-for-next-tim.patch]
diff --git a/active/CVE-2021-20321 b/active/CVE-2021-20321
index c0666400..8af6762e 100644
--- a/active/CVE-2021-20321
+++ b/active/CVE-2021-20321
@@ -9,5 +9,5 @@ upstream: released (5.15-rc5) [a295aef603e109a47af355477326bd41151765b6]
4.9-upstream-stable: released (4.9.287) [286f94453fb34f7bd6b696861c89f9a13f498721]
sid: released (5.14.12-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-20322 b/active/CVE-2021-20322
index 6b123920..159cf54e 100644
--- a/active/CVE-2021-20322
+++ b/active/CVE-2021-20322
@@ -23,5 +23,5 @@ upstream: released (5.14) [4785305c05b25a242e5314cc821f54ade4c18810, 6457378fe79
4.9-upstream-stable: released (4.9.283) [f10ce783bcc4d8ea454563a7d56ae781640e7dcb]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.70-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-22600 b/active/CVE-2021-22600
index 591776dc..fa0fa61f 100644
--- a/active/CVE-2021-22600
+++ b/active/CVE-2021-22600
@@ -11,5 +11,5 @@ upstream: released (5.16-rc6) [ec6af094ea28f0f2dda1a6a33b14cd57e36a9755]
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-28711 b/active/CVE-2021-28711
index 6b37202f..1bebe3fb 100644
--- a/active/CVE-2021-28711
+++ b/active/CVE-2021-28711
@@ -11,5 +11,5 @@ upstream: released (5.16-rc7) [0fd08a34e8e3b67ec9bd8287ac0facf8374b844a]
4.9-upstream-stable: released (4.9.294) [25898389795bd85d8e1520c0c75c3ad906c17da7]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-28712 b/active/CVE-2021-28712
index c60a92be..329c86b0 100644
--- a/active/CVE-2021-28712
+++ b/active/CVE-2021-28712
@@ -11,5 +11,5 @@ upstream: released (5.16-rc7) [b27d47950e481f292c0a5ad57357edb9d95d03ba]
4.9-upstream-stable: released (4.9.294) [99120c8230fdd5e8b72a6e4162db9e1c0a61954a]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-28713 b/active/CVE-2021-28713
index 55386e32..95a7a0d5 100644
--- a/active/CVE-2021-28713
+++ b/active/CVE-2021-28713
@@ -11,5 +11,5 @@ upstream: released (5.16-rc7) [fe415186b43df0db1f17fa3a46275fd92107fe71]
4.9-upstream-stable: released (4.9.294) [728389c21176b2095fa58e858d5ef1d2f2aac429]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-28714 b/active/CVE-2021-28714
index 7cae5971..4b79ad9c 100644
--- a/active/CVE-2021-28714
+++ b/active/CVE-2021-28714
@@ -13,5 +13,5 @@ upstream: released (5.16-rc7) [6032046ec4b70176d247a71836186d47b25d1684]
4.9-upstream-stable: released (4.9.294) [1f66dc775092e5a353e0155fc3aca5dabce77c63]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-28715 b/active/CVE-2021-28715
index c460233a..012cda65 100644
--- a/active/CVE-2021-28715
+++ b/active/CVE-2021-28715
@@ -13,5 +13,5 @@ upstream: released (5.16-rc7) [be81992f9086b230623ae3ebbc85ecee4d00a3d3]
4.9-upstream-stable: released (4.9.294) [b4226b387436315e7f57465c15335f4f4b5b075d]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-28950 b/active/CVE-2021-28950
index c27d26b4..8ce6cb50 100644
--- a/active/CVE-2021-28950
+++ b/active/CVE-2021-28950
@@ -14,5 +14,5 @@ upstream: released (5.12-rc4) [775c5033a0d164622d9d10dd0f0a5531639ed3ed]
4.9-upstream-stable: released (4.9.298) [fde32bbe9a540af28579da6480fc55cc50099ece]
sid: released (5.10.24-1) [bugfix/all/fuse-fix-live-lock-in-fuse_iget.patch]
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.272-1) [bugfix/all/fuse-fix-live-lock-in-fuse_iget.patch]
diff --git a/active/CVE-2021-3640 b/active/CVE-2021-3640
index b4fe5084..a12bde16 100644
--- a/active/CVE-2021-3640
+++ b/active/CVE-2021-3640
@@ -18,5 +18,5 @@ upstream: released (5.16-rc1) [99c23da0eed4fd20cae8243f2b51e10e66aa0951]
4.9-upstream-stable: released (4.9.291) [9bbe312ebea40c9b586c2b07a0d0948ff418beca]
sid: released (5.15.3-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-3744 b/active/CVE-2021-3744
index 34325ea3..6df0bf43 100644
--- a/active/CVE-2021-3744
+++ b/active/CVE-2021-3744
@@ -12,5 +12,5 @@ upstream: released (5.15-rc4) [505d9dcb0f7ddf9d075e729523a33d38642ae680]
4.9-upstream-stable: N/A "Vulnerability introduced later"
sid: released (5.14.12-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2021-3752 b/active/CVE-2021-3752
index 2565bd43..c98b6f45 100644
--- a/active/CVE-2021-3752
+++ b/active/CVE-2021-3752
@@ -14,5 +14,5 @@ upstream: released (5.16-rc1) [1bff51ea59a9afb67d2dd78518ab0582a54a472c]
4.9-upstream-stable: released (4.9.291) [d19ea7da0eeb61be28ec05d8b8bddec3dde71610]
sid: released (5.15.3-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-3760 b/active/CVE-2021-3760
index fd0f4b14..7e51698c 100644
--- a/active/CVE-2021-3760
+++ b/active/CVE-2021-3760
@@ -14,5 +14,5 @@ upstream: released (5.15-rc6) [1b1499a817c90fd1ce9453a2c98d2a01cca0e775]
4.9-upstream-stable: released (4.9.288) [8a44904ce83ebcb1281b04c8d37ad7f8ab537a3d]
sid: released (5.14.16-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-3764 b/active/CVE-2021-3764
index 736b7aa6..aa0387c4 100644
--- a/active/CVE-2021-3764
+++ b/active/CVE-2021-3764
@@ -12,5 +12,5 @@ upstream: released (5.15-rc4) [505d9dcb0f7ddf9d075e729523a33d38642ae680]
4.9-upstream-stable: N/A "Vulnerability introduced later"
sid: released (5.14.12-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2021-3772 b/active/CVE-2021-3772
index 6076d3cb..17447f58 100644
--- a/active/CVE-2021-3772
+++ b/active/CVE-2021-3772
@@ -10,5 +10,5 @@ upstream: released (5.15) [4f7019c7eb33967eb87766e0e4602b5576873680, eae57839080
4.9-upstream-stable: released (4.9.289) [42ce7a69f8140783bab908dc29a93c0bcda315d5, 16d0bfb045abf587c72d46dfea56c20c4aeda927]
sid: released (5.14.16-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-38300 b/active/CVE-2021-38300
index 9a6bd2c7..0a87ca12 100644
--- a/active/CVE-2021-38300
+++ b/active/CVE-2021-38300
@@ -12,5 +12,5 @@ upstream: released (5.15-rc4) [37cb28ec7d3a36a5bace7063a3dba633ab110f8b]
4.9-upstream-stable: needed
sid: released (5.14.6-1) [bugfix/mipsel/bpf-mips-Validate-conditional-branch-offsets.patch]
5.10-bullseye-security: released (5.10.70-1) [bugfix/mipsel/bpf-mips-Validate-conditional-branch-offsets.patch]
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: ignored "mips not supported in LTS"
diff --git a/active/CVE-2021-3894 b/active/CVE-2021-3894
index c40fd917..46625b85 100644
--- a/active/CVE-2021-3894
+++ b/active/CVE-2021-3894
@@ -13,5 +13,5 @@ upstream: released (5.15-rc6) [a2d859e3fc97e79d907761550dbc03ff1b36479c]
4.9-upstream-stable:
sid: released (5.14.16-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security:
diff --git a/active/CVE-2021-39685 b/active/CVE-2021-39685
index 40b1968e..0c3a2545 100644
--- a/active/CVE-2021-39685
+++ b/active/CVE-2021-39685
@@ -10,5 +10,5 @@ upstream: released (5.16-rc5) [153a2d7e3350cc89d406ba2d35be8793a64c2038, 86ebbc1
4.9-upstream-stable: released (4.9.293) [d2ca6859ea96c6d4c6ad3d6873a308a004882419, e4de8ca013f06ad4a0bf40420a291c23990e4131]
sid: released (5.15.5-2) [bugfix/all/USB-gadget-detect-too-big-endpoint-0-requests.patch, bugfix/all/USB-gadget-zero-allocate-endpoint-0-buffers.patch]
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-4002 b/active/CVE-2021-4002
index ca2b0e6d..54257aac 100644
--- a/active/CVE-2021-4002
+++ b/active/CVE-2021-4002
@@ -12,5 +12,5 @@ upstream: released (5.16-rc3) [a4a118f2eead1d6c49e00765de89878288d4b890]
4.9-upstream-stable: released (4.9.292) [8e80bf5d001594b037de04fb4fe89f34cfbcb3ba]
sid: released (5.15.5-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-4083 b/active/CVE-2021-4083
index 0685b54d..c0e119cc 100644
--- a/active/CVE-2021-4083
+++ b/active/CVE-2021-4083
@@ -10,5 +10,5 @@ upstream: released (5.16-rc4) [054aa8d439b9185d4f5eb9a90282d1ce74772969]
4.9-upstream-stable: released (4.9.292) [a043f5a600052dc93bc3d7a6a2c1592b6ee77482]
sid: released (5.15.5-2) [bugfix/all/fget-check-that-the-fd-still-exists-after-getting-a-.patch]
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-4135 b/active/CVE-2021-4135
index 50ac6a2e..516fdb0b 100644
--- a/active/CVE-2021-4135
+++ b/active/CVE-2021-4135
@@ -13,5 +13,5 @@ upstream: released (5.16-rc6) [481221775d53d6215a6e5e9ce1cce6d2b4ab9a46]
4.9-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2021-4155 b/active/CVE-2021-4155
index 899bff96..ae361bfe 100644
--- a/active/CVE-2021-4155
+++ b/active/CVE-2021-4155
@@ -11,5 +11,5 @@ upstream: released (5.16) [983d8e60f50806f90534cc5373d0ce867e5aaf79]
4.9-upstream-stable: released (4.9.297) [19e3d9a26f28f432ae89acec22ec47b2a72a502c]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-41864 b/active/CVE-2021-41864
index eb54a89f..2b28ae1c 100644
--- a/active/CVE-2021-41864
+++ b/active/CVE-2021-41864
@@ -13,5 +13,5 @@ upstream: released (5.15-rc5) [30e29a9a2bc6a4888335a6ede968b75cd329657a]
4.9-upstream-stable: released (4.9.287) [4fd6663eb01bc3c73143cd27fefd7b8351bc6aa6]
sid: released (5.14.12-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-4202 b/active/CVE-2021-4202
index 3a42a23d..6488fc5b 100644
--- a/active/CVE-2021-4202
+++ b/active/CVE-2021-4202
@@ -10,5 +10,5 @@ upstream: released (5.16-rc2) [86cdf8e38792545161dbe3350a7eced558ba4d15, 48b71a9
4.9-upstream-stable: released (4.9.291) [4a59a3681158a182557c75bacd00d184f9b2a8f5], (4.9.292) [57c076e64ab55adf556cc515914564d61979f7c2]
sid: released (5.15.5-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-4203 b/active/CVE-2021-4203
index 123a730d..82019711 100644
--- a/active/CVE-2021-4203
+++ b/active/CVE-2021-4203
@@ -13,5 +13,5 @@ upstream: released (5.15-rc4) [35306eb23814444bd4021f8a1c3047d3cb0c8b2b]
4.9-upstream-stable: released (4.9.286) [09818f629bafbe20e24bac919019853ea3ac5ca4]
sid: released (5.14.12-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-42739 b/active/CVE-2021-42739
index cddf385b..92e53110 100644
--- a/active/CVE-2021-42739
+++ b/active/CVE-2021-42739
@@ -12,5 +12,5 @@ upstream: released (5.16-rc1) [35d2969ea3c7d32aee78066b1f3cf61a0d935a4e]
4.9-upstream-stable: released (4.9.299) [1795af6435fa5f17ced2d34854fd4871e0780092]
sid: released (5.14.16-1) [bugfix/all/media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch]
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.290-1) [bugfix/all/media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch]
diff --git a/active/CVE-2021-43389 b/active/CVE-2021-43389
index 6bb779df..a1f70816 100644
--- a/active/CVE-2021-43389
+++ b/active/CVE-2021-43389
@@ -13,5 +13,5 @@ upstream: released (5.15-rc6) [1f3e2e97c003f80c4b087092b225c8787ff91e4d]
4.9-upstream-stable: released (4.9.288) [24219a977bfe3d658687e45615c70998acdbac5a]
sid: released (5.14.16-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-43975 b/active/CVE-2021-43975
index e212152a..2148f7e1 100644
--- a/active/CVE-2021-43975
+++ b/active/CVE-2021-43975
@@ -11,5 +11,5 @@ upstream: released (5.16-rc2) [b922f622592af76b57cbc566eaeccda0b31a3496]
4.9-upstream-stable: needed
sid: released (5.15.5-2) [bugfix/all/atlantic-Fix-OOB-read-and-write-in-hw_atl_utils_fw_r.patch]
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-43976 b/active/CVE-2021-43976
index ef0a39ed..b2a8c546 100644
--- a/active/CVE-2021-43976
+++ b/active/CVE-2021-43976
@@ -11,5 +11,5 @@ upstream: released (5.17-rc1) [04d80663f67ccef893061b49ec8a42ff7045ae84]
4.9-upstream-stable: released (4.9.298) [b233d7395cd104398dd83f130df5f0d57036c95e]
sid: released (5.15.15-2) [bugfix/x86/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch]
5.10-bullseye-security: released (5.10.92-2) [bugfix/x86/mwifiex-Fix-skb_over_panic-in-mwifiex_usb_recv.patch]
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-44733 b/active/CVE-2021-44733
index 357dc755..08c34247 100644
--- a/active/CVE-2021-44733
+++ b/active/CVE-2021-44733
@@ -10,5 +10,5 @@ upstream: released (5.16-rc7) [dfd0743f1d9ea76931510ed150334d571fbab49d]
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-45095 b/active/CVE-2021-45095
index 17e7663b..fb62e2e4 100644
--- a/active/CVE-2021-45095
+++ b/active/CVE-2021-45095
@@ -10,5 +10,5 @@ upstream: released (5.16-rc6) [bcd0f93353326954817a4f9fa55ec57fb38acbb0]
4.9-upstream-stable: released (4.9.297) [3bae29ecb2909c46309671090311230239f1bdd7]
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2021-45469 b/active/CVE-2021-45469
index 1d21b0a3..9749dc6f 100644
--- a/active/CVE-2021-45469
+++ b/active/CVE-2021-45469
@@ -12,5 +12,5 @@ upstream: released (5.17-rc1) [645a3c40ca3d40cc32b4b5972bf2620f2eb5dba6]
4.9-upstream-stable: needed
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: ignored "f2fs is not supportable"
diff --git a/active/CVE-2021-45480 b/active/CVE-2021-45480
index 2b35e626..33f0c354 100644
--- a/active/CVE-2021-45480
+++ b/active/CVE-2021-45480
@@ -11,5 +11,5 @@ upstream: released (5.16-rc6) [5f9562ebe710c307adc5f666bf1a2162ee7977c0]
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.15.15-1)
5.10-bullseye-security: released (5.10.92-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-0322 b/active/CVE-2022-0322
index 6d43f0cf..729920e4 100644
--- a/active/CVE-2022-0322
+++ b/active/CVE-2022-0322
@@ -11,5 +11,5 @@ upstream: released (5.15-rc6) [a2d859e3fc97e79d907761550dbc03ff1b36479c]
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.14.16-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-0330 b/active/CVE-2022-0330
index 52393656..e554cc24 100644
--- a/active/CVE-2022-0330
+++ b/active/CVE-2022-0330
@@ -10,5 +10,5 @@ upstream: released (5.17-rc2) [7938d61591d33394a21bdd7797a245b65428f44c]
4.9-upstream-stable: released (4.9.299) [84f4ab5b47d955ad2bb30115d7841d3e8f0994f4]
sid: released (5.15.15-2) [bugfix/x86/drm-i915-Flush-TLBs-before-releasing-backing-store.patch]
5.10-bullseye-security: released (5.10.92-2) [bugfix/x86/drm-i915-Flush-TLBs-before-releasing-backing-store.patch]
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2022-0435 b/active/CVE-2022-0435
index b8e3ea47..c2ea84c8 100644
--- a/active/CVE-2022-0435
+++ b/active/CVE-2022-0435
@@ -12,5 +12,5 @@ upstream: released (5.17-rc4) [9aa422ad326634b76309e8ff342c246800621216]
4.9-upstream-stable: released (4.9.301) [175db196e45d6f0e6047eccd09c8ba55465eb131]
sid: released (5.16.10-1)
5.10-bullseye-security: released (5.10.92-2) [bugfix/all/tipc-improve-size-validations-for-received-domain-re.patch]
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2022-0487 b/active/CVE-2022-0487
index 732aa66b..d2c8b84c 100644
--- a/active/CVE-2022-0487
+++ b/active/CVE-2022-0487
@@ -12,5 +12,5 @@ upstream: released (5.17-rc4) [bd2db32e7c3e35bd4d9b8bbff689434a50893546]
4.9-upstream-stable: released (4.9.301) [f5dc193167591e88797262ec78515a0cbe79ff5f]
sid: released (5.16.10-1)
5.10-bullseye-security: needed
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2022-0492 b/active/CVE-2022-0492
index ef95ecd7..8b11f746 100644
--- a/active/CVE-2022-0492
+++ b/active/CVE-2022-0492
@@ -12,6 +12,6 @@ upstream: released (5.17-rc3) [24f6008564183aa120d07c03d9289519c2fe02af]
4.19-upstream-stable: released (4.19.229) [939f8b491887c27585933ea7dc5ad4123de58ff3]
4.9-upstream-stable: released (4.9.301) [7e33a0ad792f04bad920c7197bda8cc2ea08d304]
sid: released (5.16.7-1)
-5.10-bullseye-security: needed
-4.19-buster-security: needed
+5.10-bullseye-security: pending (5.10.103-1)
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2022-0617 b/active/CVE-2022-0617
index 4e1c9e51..43a71b24 100644
--- a/active/CVE-2022-0617
+++ b/active/CVE-2022-0617
@@ -8,6 +8,6 @@ upstream: released (5.17-rc2) [7fc3b7c2981bbd1047916ade327beccb90994eee, ea85691
4.19-upstream-stable: released (4.19.228) [a23a59717f9f01a49394488f515550f9382fbada, 3740d41e7363374182a42f1621e06d5029c837d5]
4.9-upstream-stable: released (4.9.300) [f24454e42b5a58267928b0de53b0dd9b43e4dd46, de10d14ce3aacba73c835cb979a85ef9683c193f]
sid: released (5.16.7-1)
-5.10-bullseye-security: needed
-4.19-buster-security: needed
+5.10-bullseye-security: pending (5.10.103-1)
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2022-0644 b/active/CVE-2022-0644
index 05e5c859..a51d5427 100644
--- a/active/CVE-2022-0644
+++ b/active/CVE-2022-0644
@@ -11,5 +11,5 @@ upstream: released (5.15-rc7) [032146cda85566abcd1c4884d9d23e4e30a07e9a]
4.9-upstream-stable: released (4.9.288) [52ed5a196b1146e0368e95edc23c38fa1b50825a]
sid: released (5.14.16-1)
5.10-bullseye-security: released (5.10.84-1)
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2022-22942 b/active/CVE-2022-22942
index 153ea5cd..452c523c 100644
--- a/active/CVE-2022-22942
+++ b/active/CVE-2022-22942
@@ -13,5 +13,5 @@ upstream: released (5.17-rc2) [a0f90c8815706981c483a652a6aefca51a5e191c]
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.15.15-2) [bugfix/all/drm-vmwgfx-Fix-stale-file-descriptors-on-failed-user.patch]
5.10-bullseye-security: released (5.10.92-2) [bugfix/x86/drm-vmwgfx-Fix-stale-file-descriptors-on-failed-user.patch]
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2022-24448 b/active/CVE-2022-24448
index 91a27b97..d2513aad 100644
--- a/active/CVE-2022-24448
+++ b/active/CVE-2022-24448
@@ -9,5 +9,5 @@ upstream: released (5.17-rc2) [ac795161c93699d600db16c1a8cc23a65a1eceaf]
4.9-upstream-stable: released (4.9.300) [8788981e120694a82a3672e062fe4ea99446634a]
sid: released (5.16.7-1)
5.10-bullseye-security: released (5.10.92-2) [bugfix/all/NFSv4-Handle-case-where-the-lookup-of-a-directory-fa.patch]
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2022-24959 b/active/CVE-2022-24959
index 46017daf..f76c5cc6 100644
--- a/active/CVE-2022-24959
+++ b/active/CVE-2022-24959
@@ -11,5 +11,5 @@ upstream: released (5.17-rc2) [29eb31542787e1019208a2e1047bb7c76c069536]
4.9-upstream-stable: N/A "Vulnerability introduced later"
sid: released (5.16.7-1)
5.10-bullseye-security: released (5.10.92-2) [bugfix/all/yam-fix-a-memory-leak-in-yam_siocdevprivate.patch]
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2022-25258 b/active/CVE-2022-25258
index 8bb50b1f..2bb10e65 100644
--- a/active/CVE-2022-25258
+++ b/active/CVE-2022-25258
@@ -9,5 +9,5 @@ upstream: released (5.17-rc4) [75e5b4849b81e19e9efe1654b30d7f3151c33c2c]
4.9-upstream-stable: released (4.9.302) [f3bcd744b0bc8dcc6cdb3ac5be20f54aecfb78a4]
sid: released (5.16.10-1)
5.10-bullseye-security: released (5.10.92-2) [bugfix/all/USB-gadget-validate-interface-OS-descriptor-requests.patch]
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2022-25375 b/active/CVE-2022-25375
index 25071a7b..63f81597 100644
--- a/active/CVE-2022-25375
+++ b/active/CVE-2022-25375
@@ -10,5 +10,5 @@ upstream: released (5.17-rc4) [38ea1eac7d88072bbffb630e2b3db83ca649b826]
4.9-upstream-stable: released (4.9.302) [ff0a90739925734c91c7e39befe3f4378e0c1369]
sid: released (5.16.10-1)
5.10-bullseye-security: released (5.10.92-2) [bugfix/all/usb-gadget-rndis-check-size-of-RNDIS_MSG_SET-command.patch]
-4.19-buster-security: needed
+4.19-buster-security: pending (4.19.232-1)
4.9-stretch-security: pending (4.9.303-1)
diff --git a/active/CVE-2022-25636 b/active/CVE-2022-25636
index 9006dbaa..9d260630 100644
--- a/active/CVE-2022-25636
+++ b/active/CVE-2022-25636
@@ -11,6 +11,6 @@ upstream: released (5.17-rc6) [b1a5983f56e371046dcf164f90bfaf704d2b89f6]
4.19-upstream-stable: N/A "Vulnerable code not present"
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.16.11-1) [bugfix/all/netfilter-nf_tables_offload-incorrect-flow-offload-a.patch]
-5.10-bullseye-security: needed
+5.10-bullseye-security: pending (5.10.103-1)
4.19-buster-security: N/A "Vulnerable code not present"
4.9-stretch-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy