summaryrefslogtreecommitdiffstats
path: root/active
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2021-12-12 23:18:23 +0100
committerBen Hutchings <ben@decadent.org.uk>2021-12-12 23:18:23 +0100
commitc4f9a8bc8711c5a9d2061c49b16154b58bccf50e (patch)
tree44371ab1975e6742505018fd819c104c5b08c956 /active
parent82d6dc80c49b268baff36fcb7fb13969210ea1c9 (diff)
Mark issues released for stretch in 4.9.290-1
Diffstat (limited to 'active')
-rw-r--r--active/CVE-2020-161192
-rw-r--r--active/CVE-2020-37022
-rw-r--r--active/CVE-2021-09202
-rw-r--r--active/CVE-2021-203172
-rw-r--r--active/CVE-2021-203212
-rw-r--r--active/CVE-2021-203222
-rw-r--r--active/CVE-2021-225432
-rw-r--r--active/CVE-2021-36122
-rw-r--r--active/CVE-2021-36532
-rw-r--r--active/CVE-2021-36552
-rw-r--r--active/CVE-2021-36792
-rw-r--r--active/CVE-2021-371592
-rw-r--r--active/CVE-2021-37322
-rw-r--r--active/CVE-2021-37532
-rw-r--r--active/CVE-2021-37602
-rw-r--r--active/CVE-2021-381602
-rw-r--r--active/CVE-2021-381982
-rw-r--r--active/CVE-2021-381992
-rw-r--r--active/CVE-2021-382042
-rw-r--r--active/CVE-2021-382052
-rw-r--r--active/CVE-2021-404902
-rw-r--r--active/CVE-2021-418642
-rw-r--r--active/CVE-2021-420082
-rw-r--r--active/CVE-2021-427392
-rw-r--r--active/CVE-2021-433892
25 files changed, 25 insertions, 25 deletions
diff --git a/active/CVE-2020-16119 b/active/CVE-2020-16119
index 4eae27d7..2c5edbc8 100644
--- a/active/CVE-2020-16119
+++ b/active/CVE-2020-16119
@@ -14,4 +14,4 @@ upstream: released (5.15-rc2) [d9ea761fdd197351890418acd462c51f241014a7]
sid: released (5.14.6-1) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch]
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch]
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2020-3702 b/active/CVE-2020-3702
index c9db9499..1180a038 100644
--- a/active/CVE-2020-3702
+++ b/active/CVE-2020-3702
@@ -12,4 +12,4 @@ upstream: released (5.12-rc1) [56c5485c9e444c2e85e11694b6c44f1338fc20fd, 73488cb
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ath-Use-safer-key-clearing-with-key-cache-entries.patch, bugfix/all/ath9k-Clear-key-cache-explicitly-on-disabling-hardwa.patch, bugfix/all/ath-Export-ath_hw_keysetmac.patch, bugfix/ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch, bugfix/all/ath9k-Postpone-key-cache-entry-deletion-for-TXQ-fram.patch]
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-0920 b/active/CVE-2021-0920
index 6d5c467c..7016aec4 100644
--- a/active/CVE-2021-0920
+++ b/active/CVE-2021-0920
@@ -10,4 +10,4 @@ upstream: released (5.14-rc4) [cbcf01128d0a92e131bd09f1688fe032480b65ca]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-20317 b/active/CVE-2021-20317
index 90f97282..b12005a1 100644
--- a/active/CVE-2021-20317
+++ b/active/CVE-2021-20317
@@ -14,4 +14,4 @@ upstream: released (5.4-rc1) [511885d7061eda3eb1faf3f57dcc936ff75863f1]
sid: released (5.4.6-1)
5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
-4.9-stretch-security: pending (4.9.290-1) [bugfix/all/lib-timerqueue-rely-on-rbtree-semantics-for-next-tim.patch]
+4.9-stretch-security: released (4.9.290-1) [bugfix/all/lib-timerqueue-rely-on-rbtree-semantics-for-next-tim.patch]
diff --git a/active/CVE-2021-20321 b/active/CVE-2021-20321
index ad21fbc0..d6fdd85a 100644
--- a/active/CVE-2021-20321
+++ b/active/CVE-2021-20321
@@ -10,4 +10,4 @@ upstream: released (5.15-rc5) [a295aef603e109a47af355477326bd41151765b6]
sid: released (5.14.12-1)
5.10-bullseye-security: needed
4.19-buster-security: needed
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-20322 b/active/CVE-2021-20322
index ba819cf0..6b123920 100644
--- a/active/CVE-2021-20322
+++ b/active/CVE-2021-20322
@@ -24,4 +24,4 @@ upstream: released (5.14) [4785305c05b25a242e5314cc821f54ade4c18810, 6457378fe79
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: needed
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-22543 b/active/CVE-2021-22543
index 8705b9bd..d734d6a2 100644
--- a/active/CVE-2021-22543
+++ b/active/CVE-2021-22543
@@ -14,4 +14,4 @@ upstream: released (5.13) [f8be156be163a052a067306417cd0ff679068c97]
sid: released (5.10.46-2) [bugfix/all/KVM-do-not-allow-mapping-valid-but-non-reference-cou.patch]
5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1) [bugfix/all/kvm-do-not-allow-mapping-valid-but-non-reference-cou.patch]
+4.9-stretch-security: released (4.9.290-1) [bugfix/all/kvm-do-not-allow-mapping-valid-but-non-reference-cou.patch]
diff --git a/active/CVE-2021-3612 b/active/CVE-2021-3612
index 4059d8f6..a08f3b42 100644
--- a/active/CVE-2021-3612
+++ b/active/CVE-2021-3612
@@ -16,4 +16,4 @@ upstream: released (5.14-rc1) [f8f84af5da9ee04ef1d271528656dac42a090d00]
sid: released (5.10.46-3) [bugfix/all/Input-joydev-prevent-use-of-not-validated-data-in-JS.patch]
5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-3653 b/active/CVE-2021-3653
index a5abf065..e673fa36 100644
--- a/active/CVE-2021-3653
+++ b/active/CVE-2021-3653
@@ -10,4 +10,4 @@ upstream: released (5.14-rc7) [0f923e07124df069ba68d8bb12324398f4b6b709]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/x86/KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch]
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-3655 b/active/CVE-2021-3655
index d67cf99b..6da8f0dc 100644
--- a/active/CVE-2021-3655
+++ b/active/CVE-2021-3655
@@ -11,4 +11,4 @@ upstream: released (5.14-rc1) [0c5dc070ff3d6246d22ddd931f23a6266249e3db, 50619db
sid: released (5.10.46-3) [bugfix/all/sctp-validate-from_addr_param-return.patch, bugfix/all/sctp-add-size-validation-when-walking-chunks.patch]
5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-3679 b/active/CVE-2021-3679
index 901830b0..2c5e1c4a 100644
--- a/active/CVE-2021-3679
+++ b/active/CVE-2021-3679
@@ -10,4 +10,4 @@ upstream: released (5.14-rc3) [67f0d6d9883c13174669f88adac4f0ee656cc16a]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch]
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-37159 b/active/CVE-2021-37159
index e87545c3..4469c7dc 100644
--- a/active/CVE-2021-37159
+++ b/active/CVE-2021-37159
@@ -22,4 +22,4 @@ upstream: released (5.14-rc3) [a6ecfb39ba9d7316057cea823b196b734f6b18ca]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: released (4.19.208-1) [bugfix/all/usb-hso-fix-error-handling-code-of-hso_create_net_de.patch]
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-3732 b/active/CVE-2021-3732
index 9f9f6fea..0e2eac14 100644
--- a/active/CVE-2021-3732
+++ b/active/CVE-2021-3732
@@ -10,4 +10,4 @@ upstream: released (5.14-rc6) [427215d85e8d1476da1a86b8d67aceb485eb3631]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch]
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-3753 b/active/CVE-2021-3753
index 1ca34818..b045608c 100644
--- a/active/CVE-2021-3753
+++ b/active/CVE-2021-3753
@@ -10,4 +10,4 @@ upstream: released (5.15-rc1) [2287a51ba822384834dafc1c798453375d1107c7]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/vt_kdsetmode-extend-console-locking.patch]
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-3760 b/active/CVE-2021-3760
index 7c13164f..ecdb522f 100644
--- a/active/CVE-2021-3760
+++ b/active/CVE-2021-3760
@@ -15,4 +15,4 @@ upstream: released (5.15-rc6) [1b1499a817c90fd1ce9453a2c98d2a01cca0e775]
sid: released (5.14.16-1)
5.10-bullseye-security: needed
4.19-buster-security: needed
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-38160 b/active/CVE-2021-38160
index 2672c223..a988ef0d 100644
--- a/active/CVE-2021-38160
+++ b/active/CVE-2021-38160
@@ -9,4 +9,4 @@ upstream: released (5.14-rc1) [d00d8da5869a2608e97cfede094dfc5e11462a46]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/virtio_console-Assure-used-length-from-device-is-lim.patch]
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-38198 b/active/CVE-2021-38198
index 9eaed775..0f1ae11a 100644
--- a/active/CVE-2021-38198
+++ b/active/CVE-2021-38198
@@ -11,4 +11,4 @@ upstream: released (5.13-rc6) [b1bd5cba3306691c771d558e94baa73e8b0b96b7]
sid: released (5.10.46-1)
5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1) [bugfix/x86/kvm-x86-mmu-use-the-correct-inherited-permissions-to.patch]
+4.9-stretch-security: released (4.9.290-1) [bugfix/x86/kvm-x86-mmu-use-the-correct-inherited-permissions-to.patch]
diff --git a/active/CVE-2021-38199 b/active/CVE-2021-38199
index b4a1f7fc..7cc006f6 100644
--- a/active/CVE-2021-38199
+++ b/active/CVE-2021-38199
@@ -9,4 +9,4 @@ upstream: released (5.14-rc1) [dd99e9f98fbf423ff6d365b37a98e8879170f17c]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/NFSv4-Initialise-connection-to-the-server-in-nfs4_al.patch]
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1) [bugfix/all/nfsv4-initialise-connection-to-the-server-in-nfs4_al.patch]
+4.9-stretch-security: released (4.9.290-1) [bugfix/all/nfsv4-initialise-connection-to-the-server-in-nfs4_al.patch]
diff --git a/active/CVE-2021-38204 b/active/CVE-2021-38204
index 149620f2..8464c95d 100644
--- a/active/CVE-2021-38204
+++ b/active/CVE-2021-38204
@@ -10,4 +10,4 @@ upstream: released (5.14-rc3) [b5fdf5c6e6bee35837e160c00ac89327bdad031b]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-38205 b/active/CVE-2021-38205
index 76baf676..4bdb7399 100644
--- a/active/CVE-2021-38205
+++ b/active/CVE-2021-38205
@@ -10,4 +10,4 @@ upstream: released (5.14-rc1) [d0d62baa7f505bd4c59cd169692ff07ec49dde37]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-40490 b/active/CVE-2021-40490
index 9d4efb3c..2bafb6cc 100644
--- a/active/CVE-2021-40490
+++ b/active/CVE-2021-40490
@@ -11,4 +11,4 @@ upstream: released (5.15-rc1) [a54c4613dac1500b40e4ab55199f7c51f028e848]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ext4-fix-race-writing-to-an-inline_data-file-while-i.patch]
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-41864 b/active/CVE-2021-41864
index 139b815a..7a887a38 100644
--- a/active/CVE-2021-41864
+++ b/active/CVE-2021-41864
@@ -14,4 +14,4 @@ upstream: released (5.15-rc5) [30e29a9a2bc6a4888335a6ede968b75cd329657a]
sid: released (5.14.12-1)
5.10-bullseye-security: needed
4.19-buster-security: needed
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-42008 b/active/CVE-2021-42008
index b0678503..adb85fa1 100644
--- a/active/CVE-2021-42008
+++ b/active/CVE-2021-42008
@@ -9,4 +9,4 @@ upstream: released (5.14-rc7) [19d1532a187669ce86d5a2696eb7275310070793]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: released (4.19.208-1)
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)
diff --git a/active/CVE-2021-42739 b/active/CVE-2021-42739
index ef460af6..7820211b 100644
--- a/active/CVE-2021-42739
+++ b/active/CVE-2021-42739
@@ -13,4 +13,4 @@ upstream: released (5.16-rc1) [35d2969ea3c7d32aee78066b1f3cf61a0d935a4e]
sid: released (5.14.16-1) [bugfix/all/media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch]
5.10-bullseye-security: needed
4.19-buster-security: needed
-4.9-stretch-security: pending (4.9.290-1) [bugfix/all/media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch]
+4.9-stretch-security: released (4.9.290-1) [bugfix/all/media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch]
diff --git a/active/CVE-2021-43389 b/active/CVE-2021-43389
index 3b7b9841..ee3ce502 100644
--- a/active/CVE-2021-43389
+++ b/active/CVE-2021-43389
@@ -14,4 +14,4 @@ upstream: released (5.15-rc6) [1f3e2e97c003f80c4b087092b225c8787ff91e4d]
sid: released (5.14.16-1)
5.10-bullseye-security: needed
4.19-buster-security: needed
-4.9-stretch-security: pending (4.9.290-1)
+4.9-stretch-security: released (4.9.290-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy