From c4f9a8bc8711c5a9d2061c49b16154b58bccf50e Mon Sep 17 00:00:00 2001 From: Ben Hutchings Date: Sun, 12 Dec 2021 23:18:23 +0100 Subject: Mark issues released for stretch in 4.9.290-1 --- active/CVE-2020-16119 | 2 +- active/CVE-2020-3702 | 2 +- active/CVE-2021-0920 | 2 +- active/CVE-2021-20317 | 2 +- active/CVE-2021-20321 | 2 +- active/CVE-2021-20322 | 2 +- active/CVE-2021-22543 | 2 +- active/CVE-2021-3612 | 2 +- active/CVE-2021-3653 | 2 +- active/CVE-2021-3655 | 2 +- active/CVE-2021-3679 | 2 +- active/CVE-2021-37159 | 2 +- active/CVE-2021-3732 | 2 +- active/CVE-2021-3753 | 2 +- active/CVE-2021-3760 | 2 +- active/CVE-2021-38160 | 2 +- active/CVE-2021-38198 | 2 +- active/CVE-2021-38199 | 2 +- active/CVE-2021-38204 | 2 +- active/CVE-2021-38205 | 2 +- active/CVE-2021-40490 | 2 +- active/CVE-2021-41864 | 2 +- active/CVE-2021-42008 | 2 +- active/CVE-2021-42739 | 2 +- active/CVE-2021-43389 | 2 +- 25 files changed, 25 insertions(+), 25 deletions(-) (limited to 'active') diff --git a/active/CVE-2020-16119 b/active/CVE-2020-16119 index 4eae27d75..2c5edbc8e 100644 --- a/active/CVE-2020-16119 +++ b/active/CVE-2020-16119 @@ -14,4 +14,4 @@ upstream: released (5.15-rc2) [d9ea761fdd197351890418acd462c51f241014a7] sid: released (5.14.6-1) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch] 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2020-3702 b/active/CVE-2020-3702 index c9db94994..1180a0382 100644 --- a/active/CVE-2020-3702 +++ b/active/CVE-2020-3702 @@ -12,4 +12,4 @@ upstream: released (5.12-rc1) [56c5485c9e444c2e85e11694b6c44f1338fc20fd, 73488cb sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ath-Use-safer-key-clearing-with-key-cache-entries.patch, bugfix/all/ath9k-Clear-key-cache-explicitly-on-disabling-hardwa.patch, bugfix/all/ath-Export-ath_hw_keysetmac.patch, bugfix/ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch, bugfix/all/ath9k-Postpone-key-cache-entry-deletion-for-TXQ-fram.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-0920 b/active/CVE-2021-0920 index 6d5c467c6..7016aec45 100644 --- a/active/CVE-2021-0920 +++ b/active/CVE-2021-0920 @@ -10,4 +10,4 @@ upstream: released (5.14-rc4) [cbcf01128d0a92e131bd09f1688fe032480b65ca] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-20317 b/active/CVE-2021-20317 index 90f972827..b12005a1e 100644 --- a/active/CVE-2021-20317 +++ b/active/CVE-2021-20317 @@ -14,4 +14,4 @@ upstream: released (5.4-rc1) [511885d7061eda3eb1faf3f57dcc936ff75863f1] sid: released (5.4.6-1) 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.290-1) [bugfix/all/lib-timerqueue-rely-on-rbtree-semantics-for-next-tim.patch] +4.9-stretch-security: released (4.9.290-1) [bugfix/all/lib-timerqueue-rely-on-rbtree-semantics-for-next-tim.patch] diff --git a/active/CVE-2021-20321 b/active/CVE-2021-20321 index ad21fbc0f..d6fdd85a5 100644 --- a/active/CVE-2021-20321 +++ b/active/CVE-2021-20321 @@ -10,4 +10,4 @@ upstream: released (5.15-rc5) [a295aef603e109a47af355477326bd41151765b6] sid: released (5.14.12-1) 5.10-bullseye-security: needed 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-20322 b/active/CVE-2021-20322 index ba819cf04..6b123920b 100644 --- a/active/CVE-2021-20322 +++ b/active/CVE-2021-20322 @@ -24,4 +24,4 @@ upstream: released (5.14) [4785305c05b25a242e5314cc821f54ade4c18810, 6457378fe79 sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-22543 b/active/CVE-2021-22543 index 8705b9bd4..d734d6a2d 100644 --- a/active/CVE-2021-22543 +++ b/active/CVE-2021-22543 @@ -14,4 +14,4 @@ upstream: released (5.13) [f8be156be163a052a067306417cd0ff679068c97] sid: released (5.10.46-2) [bugfix/all/KVM-do-not-allow-mapping-valid-but-non-reference-cou.patch] 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) [bugfix/all/kvm-do-not-allow-mapping-valid-but-non-reference-cou.patch] +4.9-stretch-security: released (4.9.290-1) [bugfix/all/kvm-do-not-allow-mapping-valid-but-non-reference-cou.patch] diff --git a/active/CVE-2021-3612 b/active/CVE-2021-3612 index 4059d8f63..a08f3b42a 100644 --- a/active/CVE-2021-3612 +++ b/active/CVE-2021-3612 @@ -16,4 +16,4 @@ upstream: released (5.14-rc1) [f8f84af5da9ee04ef1d271528656dac42a090d00] sid: released (5.10.46-3) [bugfix/all/Input-joydev-prevent-use-of-not-validated-data-in-JS.patch] 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-3653 b/active/CVE-2021-3653 index a5abf065f..e673fa363 100644 --- a/active/CVE-2021-3653 +++ b/active/CVE-2021-3653 @@ -10,4 +10,4 @@ upstream: released (5.14-rc7) [0f923e07124df069ba68d8bb12324398f4b6b709] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/x86/KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-3655 b/active/CVE-2021-3655 index d67cf99bc..6da8f0dcb 100644 --- a/active/CVE-2021-3655 +++ b/active/CVE-2021-3655 @@ -11,4 +11,4 @@ upstream: released (5.14-rc1) [0c5dc070ff3d6246d22ddd931f23a6266249e3db, 50619db sid: released (5.10.46-3) [bugfix/all/sctp-validate-from_addr_param-return.patch, bugfix/all/sctp-add-size-validation-when-walking-chunks.patch] 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-3679 b/active/CVE-2021-3679 index 901830b08..2c5e1c4a3 100644 --- a/active/CVE-2021-3679 +++ b/active/CVE-2021-3679 @@ -10,4 +10,4 @@ upstream: released (5.14-rc3) [67f0d6d9883c13174669f88adac4f0ee656cc16a] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-37159 b/active/CVE-2021-37159 index e87545c30..4469c7dc5 100644 --- a/active/CVE-2021-37159 +++ b/active/CVE-2021-37159 @@ -22,4 +22,4 @@ upstream: released (5.14-rc3) [a6ecfb39ba9d7316057cea823b196b734f6b18ca] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: released (4.19.208-1) [bugfix/all/usb-hso-fix-error-handling-code-of-hso_create_net_de.patch] -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-3732 b/active/CVE-2021-3732 index 9f9f6fea8..0e2eac14f 100644 --- a/active/CVE-2021-3732 +++ b/active/CVE-2021-3732 @@ -10,4 +10,4 @@ upstream: released (5.14-rc6) [427215d85e8d1476da1a86b8d67aceb485eb3631] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-3753 b/active/CVE-2021-3753 index 1ca348181..b045608cf 100644 --- a/active/CVE-2021-3753 +++ b/active/CVE-2021-3753 @@ -10,4 +10,4 @@ upstream: released (5.15-rc1) [2287a51ba822384834dafc1c798453375d1107c7] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/vt_kdsetmode-extend-console-locking.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-3760 b/active/CVE-2021-3760 index 7c13164fd..ecdb522fe 100644 --- a/active/CVE-2021-3760 +++ b/active/CVE-2021-3760 @@ -15,4 +15,4 @@ upstream: released (5.15-rc6) [1b1499a817c90fd1ce9453a2c98d2a01cca0e775] sid: released (5.14.16-1) 5.10-bullseye-security: needed 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-38160 b/active/CVE-2021-38160 index 2672c2230..a988ef0de 100644 --- a/active/CVE-2021-38160 +++ b/active/CVE-2021-38160 @@ -9,4 +9,4 @@ upstream: released (5.14-rc1) [d00d8da5869a2608e97cfede094dfc5e11462a46] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/virtio_console-Assure-used-length-from-device-is-lim.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-38198 b/active/CVE-2021-38198 index 9eaed775a..0f1ae11a7 100644 --- a/active/CVE-2021-38198 +++ b/active/CVE-2021-38198 @@ -11,4 +11,4 @@ upstream: released (5.13-rc6) [b1bd5cba3306691c771d558e94baa73e8b0b96b7] sid: released (5.10.46-1) 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) [bugfix/x86/kvm-x86-mmu-use-the-correct-inherited-permissions-to.patch] +4.9-stretch-security: released (4.9.290-1) [bugfix/x86/kvm-x86-mmu-use-the-correct-inherited-permissions-to.patch] diff --git a/active/CVE-2021-38199 b/active/CVE-2021-38199 index b4a1f7fcd..7cc006f63 100644 --- a/active/CVE-2021-38199 +++ b/active/CVE-2021-38199 @@ -9,4 +9,4 @@ upstream: released (5.14-rc1) [dd99e9f98fbf423ff6d365b37a98e8879170f17c] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/NFSv4-Initialise-connection-to-the-server-in-nfs4_al.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) [bugfix/all/nfsv4-initialise-connection-to-the-server-in-nfs4_al.patch] +4.9-stretch-security: released (4.9.290-1) [bugfix/all/nfsv4-initialise-connection-to-the-server-in-nfs4_al.patch] diff --git a/active/CVE-2021-38204 b/active/CVE-2021-38204 index 149620f22..8464c95d6 100644 --- a/active/CVE-2021-38204 +++ b/active/CVE-2021-38204 @@ -10,4 +10,4 @@ upstream: released (5.14-rc3) [b5fdf5c6e6bee35837e160c00ac89327bdad031b] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-38205 b/active/CVE-2021-38205 index 76baf6764..4bdb73997 100644 --- a/active/CVE-2021-38205 +++ b/active/CVE-2021-38205 @@ -10,4 +10,4 @@ upstream: released (5.14-rc1) [d0d62baa7f505bd4c59cd169692ff07ec49dde37] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-40490 b/active/CVE-2021-40490 index 9d4efb3c1..2bafb6cce 100644 --- a/active/CVE-2021-40490 +++ b/active/CVE-2021-40490 @@ -11,4 +11,4 @@ upstream: released (5.15-rc1) [a54c4613dac1500b40e4ab55199f7c51f028e848] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ext4-fix-race-writing-to-an-inline_data-file-while-i.patch] 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-41864 b/active/CVE-2021-41864 index 139b815ad..7a887a383 100644 --- a/active/CVE-2021-41864 +++ b/active/CVE-2021-41864 @@ -14,4 +14,4 @@ upstream: released (5.15-rc5) [30e29a9a2bc6a4888335a6ede968b75cd329657a] sid: released (5.14.12-1) 5.10-bullseye-security: needed 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-42008 b/active/CVE-2021-42008 index b06785031..adb85fa1f 100644 --- a/active/CVE-2021-42008 +++ b/active/CVE-2021-42008 @@ -9,4 +9,4 @@ upstream: released (5.14-rc7) [19d1532a187669ce86d5a2696eb7275310070793] sid: released (5.14.6-1) 5.10-bullseye-security: released (5.10.70-1) 4.19-buster-security: released (4.19.208-1) -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) diff --git a/active/CVE-2021-42739 b/active/CVE-2021-42739 index ef460af66..7820211ba 100644 --- a/active/CVE-2021-42739 +++ b/active/CVE-2021-42739 @@ -13,4 +13,4 @@ upstream: released (5.16-rc1) [35d2969ea3c7d32aee78066b1f3cf61a0d935a4e] sid: released (5.14.16-1) [bugfix/all/media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch] 5.10-bullseye-security: needed 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.290-1) [bugfix/all/media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch] +4.9-stretch-security: released (4.9.290-1) [bugfix/all/media-firewire-firedtv-avc-fix-a-buffer-overflow-in-.patch] diff --git a/active/CVE-2021-43389 b/active/CVE-2021-43389 index 3b7b9841e..ee3ce5022 100644 --- a/active/CVE-2021-43389 +++ b/active/CVE-2021-43389 @@ -14,4 +14,4 @@ upstream: released (5.15-rc6) [1f3e2e97c003f80c4b087092b225c8787ff91e4d] sid: released (5.14.16-1) 5.10-bullseye-security: needed 4.19-buster-security: needed -4.9-stretch-security: pending (4.9.290-1) +4.9-stretch-security: released (4.9.290-1) -- cgit v1.2.3