From e33f586f31f8042b29511f3071182d0359ceca28 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Mon, 15 Jun 2020 07:26:43 +0200 Subject: Mark 5.8-rc1 released upstream --- active/CVE-2019-19462 | 2 +- active/CVE-2020-0543 | 2 +- active/CVE-2020-10757 | 2 +- active/CVE-2020-10766 | 2 +- active/CVE-2020-10767 | 2 +- active/CVE-2020-10768 | 2 +- active/CVE-2020-12888 | 2 +- active/CVE-2020-13974 | 2 +- 8 files changed, 8 insertions(+), 8 deletions(-) diff --git a/active/CVE-2019-19462 b/active/CVE-2019-19462 index 92b0e37e..14fd4745 100644 --- a/active/CVE-2019-19462 +++ b/active/CVE-2019-19462 @@ -10,7 +10,7 @@ Notes: bwh> Introduced in 4.9 (not 4.10) by commit 017c59c042d0 "relay: Use per bwh> CPU constructs for the relay channel buffer pointers". Bugs: -upstream: pending [54e200ab40fc14c863bcc80a51e20b7906608fce] +upstream: released (5.8-rc1) [54e200ab40fc14c863bcc80a51e20b7906608fce] 4.19-upstream-stable: released (4.19.127) [8b5dfa53eeb6c8bba5a035d38f6f8b981aebb622] 4.9-upstream-stable: released (4.9.227) [d1774b0459875e2bf3e93b86294296e5494fd0b7] 3.16-upstream-stable: N/A "Vulnerability introduced later" diff --git a/active/CVE-2020-0543 b/active/CVE-2020-0543 index 2c388c3d..efe4ae1d 100644 --- a/active/CVE-2020-0543 +++ b/active/CVE-2020-0543 @@ -8,7 +8,7 @@ Notes: bwh> to allow disabling the mitigation where it is unneeded. bwh> Embargoed until 2020-06-09 17:00 UTC. Bugs: -upstream: pending (5.8-rc1) [e9d7144597b10ff13ff2264c059f7d4a7fbc89ac, 93920f61c2ad7edb01e63323832585796af75fc9, 7e5b3c267d256822407a22fdce6afdf9cd13f9fb, 7222a1b5b87417f22265c92deea76a6aecd0fb0f, 3798cc4d106e91382bfe016caa2edada27c2bb3f] +upstream: released (5.8-rc1) [e9d7144597b10ff13ff2264c059f7d4a7fbc89ac, 93920f61c2ad7edb01e63323832585796af75fc9, 7e5b3c267d256822407a22fdce6afdf9cd13f9fb, 7222a1b5b87417f22265c92deea76a6aecd0fb0f, 3798cc4d106e91382bfe016caa2edada27c2bb3f] 4.19-upstream-stable: released (4.19.128) [253b9e7ac000154fc41b217660cb4c99f51e2ed0, 6682fe2fca22e45153e69f5b7ce7282bcba3565f, b65105dc4242f949cea9264851ff5e5473434a91, 00c2119c632e04948677a941cbad2427b0666046, 79623df18eacf685c1ee4a1c4c185b3b92eb1167] 4.9-upstream-stable: released (4.9.227) [5f8f40583aad4aa3c0fc8a9adaa9f1c988fa8e9e, 15cf7ca9f59ff911cd5582969377bbf8c2ecab8a, 2f93f8d6891c2bd3963e1c68ad3eabf4dd6a55af, 2808035ba55eb8aaaf5eb37421dbfff37c1f25a8, 4798f72395eb523d251f18226527329debe353e9] 3.16-upstream-stable: released (3.16.85) [bed86e750bb02981a5efe110b7e9ae3d989a2e73, 98a637c406eefe95f2428739c1397f250bb7fadd, 8c95356f8493c164c8878134d25f30cbd6d7ae5c, 0d314e817a11e62ab223b27166de0c6b3859e0e7, 948cfe9d8a2e3f0465340d5dea9d61f282df00e7] diff --git a/active/CVE-2020-10757 b/active/CVE-2020-10757 index 3cbf659d..f4e68bb1 100644 --- a/active/CVE-2020-10757 +++ b/active/CVE-2020-10757 @@ -6,7 +6,7 @@ Notes: carnil> Introduced in 5c7fb56e5e3f ("mm, dax: dax-pmd vs thp-pmd vs carnil> hugetlbfs-pmd") in 4.5-rc1 Bugs: -upstream: pending [5bfea2d9b17f1034a68147a8b03b9789af5700f9] +upstream: released (5.8-rc1) [5bfea2d9b17f1034a68147a8b03b9789af5700f9] 4.19-upstream-stable: released (4.19.127) [78385480fd6572a83e7541e37658d9a7de6dc9b1] 4.9-upstream-stable: released (4.9.227) [c915cffda0a4329ee454646138fe2b11c5ba3cd6] 3.16-upstream-stable: N/A "Vulnerable code introduced later" diff --git a/active/CVE-2020-10766 b/active/CVE-2020-10766 index 36176817..862f652f 100644 --- a/active/CVE-2020-10766 +++ b/active/CVE-2020-10766 @@ -7,7 +7,7 @@ Notes: carnil> Commit fixes 5bfbe3ad5840 ("x86/speculation: Prepare for per carnil> task indirect branch speculation control") Bugs: -upstream: pending [dbbe2ad02e9df26e372f38cc3e70dab9222c832e] +upstream: released (5.8-rc1) [dbbe2ad02e9df26e372f38cc3e70dab9222c832e] 4.19-upstream-stable: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed diff --git a/active/CVE-2020-10767 b/active/CVE-2020-10767 index 6af82ac1..34160c9b 100644 --- a/active/CVE-2020-10767 +++ b/active/CVE-2020-10767 @@ -7,7 +7,7 @@ Notes: carnil> Commit fixes 7cc765a67d8e ("x86/speculation: Enable prctl mode carnil> for spectre_v2_user") Bugs: -upstream: pending [21998a351512eba4ed5969006f0c55882d995ada] +upstream: released (5.8-rc1) [21998a351512eba4ed5969006f0c55882d995ada] 4.19-upstream-stable: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed diff --git a/active/CVE-2020-10768 b/active/CVE-2020-10768 index 305afac2..46d770c5 100644 --- a/active/CVE-2020-10768 +++ b/active/CVE-2020-10768 @@ -7,7 +7,7 @@ Notes: carnil> Commit fixes 9137bb27e60e ("x86/speculation: Add prctl() carnil> control for indirect branch speculation") Bugs: -upstream: pending [4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf] +upstream: released (5.8-rc1) [4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf] 4.19-upstream-stable: needed 4.9-upstream-stable: needed 3.16-upstream-stable: needed diff --git a/active/CVE-2020-12888 b/active/CVE-2020-12888 index f9d69d6f..991853c1 100644 --- a/active/CVE-2020-12888 +++ b/active/CVE-2020-12888 @@ -5,7 +5,7 @@ References: https://lore.kernel.org/kvm/158871570274.15589.10563806532874116326.stgit@gimli.home/ Notes: Bugs: -upstream: pending [abafbc551fddede3e0a08dee1dcde08fc0eb8476] +upstream: released (5.8-rc1) [abafbc551fddede3e0a08dee1dcde08fc0eb8476] 4.19-upstream-stable: 4.9-upstream-stable: 3.16-upstream-stable: diff --git a/active/CVE-2020-13974 b/active/CVE-2020-13974 index 07c5849a..5adfd316 100644 --- a/active/CVE-2020-13974 +++ b/active/CVE-2020-13974 @@ -3,7 +3,7 @@ References: https://lkml.org/lkml/2020/3/22/482 Notes: Bugs: -upstream: pending [b86dab054059b970111b5516ae548efaae5b3aae] +upstream: released (5.8-rc1) [b86dab054059b970111b5516ae548efaae5b3aae] 4.19-upstream-stable: released (4.19.128) [18059925dbb6a7b6be1c0166ecca29d6b7977c9a] 4.9-upstream-stable: released (4.9.227) [adf823fa2a53db5d119d90817778f263a3a47608] 3.16-upstream-stable: -- cgit v1.2.3