summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-09-29 21:09:30 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2021-10-06 20:21:47 +0200
commit0d7fcf86665d7756c58384b3b6058cd7893b2e09 (patch)
treefeac2a034cc1c885981d53d9dc7f678caa48a2ee
parentd029f86a849f1d590a581afd9fda02094f5b0a90 (diff)
Track CVE fixes released in 4.19.208-1 tagged version for buster-pu for 10.11
-rw-r--r--active/CVE-2020-161192
-rw-r--r--active/CVE-2020-37022
-rw-r--r--active/CVE-2021-225432
-rw-r--r--active/CVE-2021-336242
-rw-r--r--active/CVE-2021-34442
-rw-r--r--active/CVE-2021-345562
-rw-r--r--active/CVE-2021-350392
-rw-r--r--active/CVE-2021-354772
-rw-r--r--active/CVE-2021-36002
-rw-r--r--active/CVE-2021-36122
-rw-r--r--active/CVE-2021-36532
-rw-r--r--active/CVE-2021-36552
-rw-r--r--active/CVE-2021-36562
-rw-r--r--active/CVE-2021-36792
-rw-r--r--active/CVE-2021-371592
-rw-r--r--active/CVE-2021-37322
-rw-r--r--active/CVE-2021-37432
-rw-r--r--active/CVE-2021-37532
-rw-r--r--active/CVE-2021-375762
-rw-r--r--active/CVE-2021-381602
-rw-r--r--active/CVE-2021-381982
-rw-r--r--active/CVE-2021-381992
-rw-r--r--active/CVE-2021-382042
-rw-r--r--active/CVE-2021-382052
-rw-r--r--active/CVE-2021-404902
-rw-r--r--active/CVE-2021-420082
26 files changed, 26 insertions, 26 deletions
diff --git a/active/CVE-2020-16119 b/active/CVE-2020-16119
index a6247dba..78a189e3 100644
--- a/active/CVE-2020-16119
+++ b/active/CVE-2020-16119
@@ -13,5 +13,5 @@ upstream: released (5.15-rc2) [d9ea761fdd197351890418acd462c51f241014a7]
4.9-upstream-stable: released (4.9.283) [40ea36ffa7207456c3f155bbab76754d3f37ce04]
sid: released (5.14.6-1) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch]
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2020-3702 b/active/CVE-2020-3702
index 72143bcb..f6ef3f9f 100644
--- a/active/CVE-2020-3702
+++ b/active/CVE-2020-3702
@@ -11,5 +11,5 @@ upstream: released (5.12-rc1) [56c5485c9e444c2e85e11694b6c44f1338fc20fd, 73488cb
4.9-upstream-stable: released (4.9.283) [ea3f7df20fc8e0b82ec0e065b0b0d38e55fd7775, 74adc24d162e67d8862edaf701de620f36f98215, d7d4c3c60342deba706fd76ef09d8af68b9a64d8, 13c51682b07a5db4d9efb514e700407c6da22ff9, 7afed8faf42d8358a165ba554891085e10b1f7a0]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ath-Use-safer-key-clearing-with-key-cache-entries.patch, bugfix/all/ath9k-Clear-key-cache-explicitly-on-disabling-hardwa.patch, bugfix/all/ath-Export-ath_hw_keysetmac.patch, bugfix/ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch, bugfix/all/ath9k-Postpone-key-cache-entry-deletion-for-TXQ-fram.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-22543 b/active/CVE-2021-22543
index 3c7f043b..5adec202 100644
--- a/active/CVE-2021-22543
+++ b/active/CVE-2021-22543
@@ -10,5 +10,5 @@ upstream: released (5.13) [f8be156be163a052a067306417cd0ff679068c97]
4.9-upstream-stable: needed
sid: released (5.10.46-2) [bugfix/all/KVM-do-not-allow-mapping-valid-but-non-reference-cou.patch]
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-33624 b/active/CVE-2021-33624
index 8d18f691..0cbf2373 100644
--- a/active/CVE-2021-33624
+++ b/active/CVE-2021-33624
@@ -13,5 +13,5 @@ upstream: released (5.13-rc7) [d203b0fd863a2261e5d00b97f3d060c4c2a6db71, fe9a5ca
4.9-upstream-stable: needed
sid: released (5.10.46-1)
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-3444 b/active/CVE-2021-3444
index 032da589..1ad266f1 100644
--- a/active/CVE-2021-3444
+++ b/active/CVE-2021-3444
@@ -19,5 +19,5 @@ upstream: released (5.12-rc1) [9b00f1b78809309163dda2d044d9e94a3c0248a3]
4.9-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.10.19-1)
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2021-34556 b/active/CVE-2021-34556
index c38ddf00..7945edc4 100644
--- a/active/CVE-2021-34556
+++ b/active/CVE-2021-34556
@@ -10,5 +10,5 @@ upstream: released (5.14-rc4) [f5e81d1117501546b7be050c5fbafa6efd2c722c, 2039f26
4.9-upstream-stable: needed
sid: released (5.10.46-4) [bugfix/all/bpf-introduce-bpf-nospec-instruction-for-mitigating-.patch, bugfix/all/bpf-fix-leakage-due-to-insufficient-speculative-stor.patch]
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-35039 b/active/CVE-2021-35039
index 3ea8594c..492d673d 100644
--- a/active/CVE-2021-35039
+++ b/active/CVE-2021-35039
@@ -12,5 +12,5 @@ upstream: released (5.13) [0c18f29aae7ce3dadd26d8ee3505d07cc982df75]
4.9-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.14.6-1)
5.10-bullseye-security: needed
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2021-35477 b/active/CVE-2021-35477
index c38ddf00..7945edc4 100644
--- a/active/CVE-2021-35477
+++ b/active/CVE-2021-35477
@@ -10,5 +10,5 @@ upstream: released (5.14-rc4) [f5e81d1117501546b7be050c5fbafa6efd2c722c, 2039f26
4.9-upstream-stable: needed
sid: released (5.10.46-4) [bugfix/all/bpf-introduce-bpf-nospec-instruction-for-mitigating-.patch, bugfix/all/bpf-fix-leakage-due-to-insufficient-speculative-stor.patch]
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-3600 b/active/CVE-2021-3600
index fdc21213..0fd38bbe 100644
--- a/active/CVE-2021-3600
+++ b/active/CVE-2021-3600
@@ -13,5 +13,5 @@ upstream: released (5.11) [e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90]
4.9-upstream-stable: needed
sid: released (5.10.19-1)
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-3612 b/active/CVE-2021-3612
index 1383a36d..801c7ea2 100644
--- a/active/CVE-2021-3612
+++ b/active/CVE-2021-3612
@@ -15,5 +15,5 @@ upstream: released (5.14-rc1) [f8f84af5da9ee04ef1d271528656dac42a090d00]
4.9-upstream-stable: released (4.9.276) [f3673f6f63db2aa08c35e707a2fdcbcc6590c391]
sid: released (5.10.46-3) [bugfix/all/Input-joydev-prevent-use-of-not-validated-data-in-JS.patch]
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-3653 b/active/CVE-2021-3653
index b42e589b..f69f1fa4 100644
--- a/active/CVE-2021-3653
+++ b/active/CVE-2021-3653
@@ -9,5 +9,5 @@ upstream: released (5.14-rc7) [0f923e07124df069ba68d8bb12324398f4b6b709]
4.9-upstream-stable: released (4.9.281) [29c4f674715ba8fe7a391473313e8c71f98799c4]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/x86/KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-3655 b/active/CVE-2021-3655
index cd84fd7e..d5d59478 100644
--- a/active/CVE-2021-3655
+++ b/active/CVE-2021-3655
@@ -10,5 +10,5 @@ upstream: released (5.14-rc1) [0c5dc070ff3d6246d22ddd931f23a6266249e3db, 50619db
4.9-upstream-stable: released (4.9.276) [c7da1d1ed43a6c2bece0d287e2415adf2868697e], released (4.9.284) [92e7bca98452aa760713016a434aa7edfc09fb13, 6b5361868870e9a097745446798aa10ee92c159c, 4d2de0d232ee386fceacf7cdb20a6398c3c0854b]
sid: released (5.10.46-3) [bugfix/all/sctp-validate-from_addr_param-return.patch, bugfix/all/sctp-add-size-validation-when-walking-chunks.patch]
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-3656 b/active/CVE-2021-3656
index c02de2f2..f34d6a03 100644
--- a/active/CVE-2021-3656
+++ b/active/CVE-2021-3656
@@ -11,5 +11,5 @@ upstream: released (5.14-rc7) [c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc]
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/x86/KVM-nSVM-always-intercept-VMLOAD-VMSAVE-when-nested-.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-3679 b/active/CVE-2021-3679
index 8709619c..f26e32de 100644
--- a/active/CVE-2021-3679
+++ b/active/CVE-2021-3679
@@ -9,5 +9,5 @@ upstream: released (5.14-rc3) [67f0d6d9883c13174669f88adac4f0ee656cc16a]
4.9-upstream-stable: released (4.9.277) [7db12bae1a239d872d17e128fd5271da789bf99c]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-37159 b/active/CVE-2021-37159
index 3bf419cd..74dfe07d 100644
--- a/active/CVE-2021-37159
+++ b/active/CVE-2021-37159
@@ -21,5 +21,5 @@ upstream: released (5.14-rc3) [a6ecfb39ba9d7316057cea823b196b734f6b18ca]
4.9-upstream-stable: needed
sid: released (5.14.6-1)
5.10-bullseye-security: needed
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1) [bugfix/all/usb-hso-fix-error-handling-code-of-hso_create_net_de.patch]
4.9-stretch-security: needed
diff --git a/active/CVE-2021-3732 b/active/CVE-2021-3732
index 8b95380d..e66ae0cf 100644
--- a/active/CVE-2021-3732
+++ b/active/CVE-2021-3732
@@ -9,5 +9,5 @@ upstream: released (5.14-rc6) [427215d85e8d1476da1a86b8d67aceb485eb3631]
4.9-upstream-stable: released (4.9.280) [e3eee87c846dc47f6d8eb6d85e7271f24122a279]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-3743 b/active/CVE-2021-3743
index cee60251..bd57394d 100644
--- a/active/CVE-2021-3743
+++ b/active/CVE-2021-3743
@@ -12,5 +12,5 @@ upstream: released (5.14) [7e78c597c3ebfd0cb329aa09a838734147e4f117]
4.9-upstream-stable: N/A "Vulnerability introduced later"
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_post.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2021-3753 b/active/CVE-2021-3753
index 0add411a..0881fa19 100644
--- a/active/CVE-2021-3753
+++ b/active/CVE-2021-3753
@@ -9,5 +9,5 @@ upstream: released (5.15-rc1) [2287a51ba822384834dafc1c798453375d1107c7]
4.9-upstream-stable: released (4.9.282) [755a2f40dda2d6b2e3b8624cb052e68947ee4d1f]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/vt_kdsetmode-extend-console-locking.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-37576 b/active/CVE-2021-37576
index 22a0e9e6..84191c26 100644
--- a/active/CVE-2021-37576
+++ b/active/CVE-2021-37576
@@ -10,5 +10,5 @@ upstream: released (5.14-rc3) [f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a]
4.9-upstream-stable: released (4.9.277) [8c46b4b2749c4b3b7e602403addc32ec2b48baed]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/powerpc/KVM-PPC-Book3S-Fix-H_RTAS-rets-buffer-overflow.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: ignored "powerpc not supported in LTS"
diff --git a/active/CVE-2021-38160 b/active/CVE-2021-38160
index 23059d92..8eb8a7a6 100644
--- a/active/CVE-2021-38160
+++ b/active/CVE-2021-38160
@@ -8,5 +8,5 @@ upstream: released (5.14-rc1) [d00d8da5869a2608e97cfede094dfc5e11462a46]
4.9-upstream-stable: released (4.9.276) [9e2b8368b2079437c6840f3303cb0b7bc9b896ee]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/virtio_console-Assure-used-length-from-device-is-lim.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-38198 b/active/CVE-2021-38198
index d2453502..8861f771 100644
--- a/active/CVE-2021-38198
+++ b/active/CVE-2021-38198
@@ -8,5 +8,5 @@ upstream: released (5.13-rc6) [b1bd5cba3306691c771d558e94baa73e8b0b96b7]
4.9-upstream-stable: needed
sid: released (5.10.46-1)
5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-38199 b/active/CVE-2021-38199
index 1c07a7df..24152b54 100644
--- a/active/CVE-2021-38199
+++ b/active/CVE-2021-38199
@@ -8,5 +8,5 @@ upstream: released (5.14-rc1) [dd99e9f98fbf423ff6d365b37a98e8879170f17c]
4.9-upstream-stable: needed
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/NFSv4-Initialise-connection-to-the-server-in-nfs4_al.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-38204 b/active/CVE-2021-38204
index d47fcdf3..a6f8eaa6 100644
--- a/active/CVE-2021-38204
+++ b/active/CVE-2021-38204
@@ -9,5 +9,5 @@ upstream: released (5.14-rc3) [b5fdf5c6e6bee35837e160c00ac89327bdad031b]
4.9-upstream-stable: released (4.9.277) [ae3209b9fb086661ec1de4d8f4f0b951b272bbcd]
sid: released (5.14.6-1)
5.10-bullseye-security: needed
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-38205 b/active/CVE-2021-38205
index e400f131..799d9c41 100644
--- a/active/CVE-2021-38205
+++ b/active/CVE-2021-38205
@@ -9,5 +9,5 @@ upstream: released (5.14-rc1) [d0d62baa7f505bd4c59cd169692ff07ec49dde37]
4.9-upstream-stable: released (4.9.280) [ffdc1e312e2074875147c1df90764a9bae56f11f]
sid: released (5.14.6-1)
5.10-bullseye-security: needed
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-40490 b/active/CVE-2021-40490
index b1c85539..49f03352 100644
--- a/active/CVE-2021-40490
+++ b/active/CVE-2021-40490
@@ -10,5 +10,5 @@ upstream: released (5.15-rc1) [a54c4613dac1500b40e4ab55199f7c51f028e848]
4.9-upstream-stable: released (4.9.283) [7067b09fe587cbd47544a3047a40c64e4d636fff]
sid: released (5.14.6-1)
5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ext4-fix-race-writing-to-an-inline_data-file-while-i.patch]
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-42008 b/active/CVE-2021-42008
index 544ee029..3c409f36 100644
--- a/active/CVE-2021-42008
+++ b/active/CVE-2021-42008
@@ -8,5 +8,5 @@ upstream: released (5.14-rc7) [19d1532a187669ce86d5a2696eb7275310070793]
4.9-upstream-stable: released (4.9.281) [de9171c1d9a5c2c4c5ec5e64f420681f178152fa]
sid: released (5.14.6-1)
5.10-bullseye-security: needed
-4.19-buster-security: needed
+4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy