summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-09-30 21:15:13 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2021-10-06 20:21:47 +0200
commit2140336670dad1959d2e0542125ba4a883e8a7fe (patch)
treee02d70cdc342324f6f76259c3159e4cc1cadf0c2
parent0d7fcf86665d7756c58384b3b6058cd7893b2e09 (diff)
Track CVE fixes released in 5.10.70-1 tagged version for bullseye-pu for 11.1
-rw-r--r--active/CVE-2020-265412
-rw-r--r--active/CVE-2021-350392
-rw-r--r--active/CVE-2021-371592
-rw-r--r--active/CVE-2021-382042
-rw-r--r--active/CVE-2021-382052
-rw-r--r--active/CVE-2021-383002
-rw-r--r--active/CVE-2021-420082
7 files changed, 7 insertions, 7 deletions
diff --git a/active/CVE-2020-26541 b/active/CVE-2020-26541
index e07db3da..562bd3a1 100644
--- a/active/CVE-2020-26541
+++ b/active/CVE-2020-26541
@@ -14,6 +14,6 @@ upstream: released (5.13-rc1) [56c5812623f95313f6a46fbf0beee7fa17c68bbf]
4.19-upstream-stable: N/A "Secure Boot key import not supported"
4.9-upstream-stable: N/A "Secure Boot key import not supported"
sid: released (5.14.6-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: needed
4.9-stretch-security: N/A "Secure Boot key import not supported"
diff --git a/active/CVE-2021-35039 b/active/CVE-2021-35039
index 492d673d..8baafa96 100644
--- a/active/CVE-2021-35039
+++ b/active/CVE-2021-35039
@@ -11,6 +11,6 @@ upstream: released (5.13) [0c18f29aae7ce3dadd26d8ee3505d07cc982df75]
4.19-upstream-stable: released (4.19.196) [ff660863628fb144badcb3395cde7821c82c13a6]
4.9-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.14.6-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2021-37159 b/active/CVE-2021-37159
index 74dfe07d..114f7bd4 100644
--- a/active/CVE-2021-37159
+++ b/active/CVE-2021-37159
@@ -20,6 +20,6 @@ upstream: released (5.14-rc3) [a6ecfb39ba9d7316057cea823b196b734f6b18ca]
4.19-upstream-stable: released (4.19.209) [f6cf22a1ef49f8e131f99c3f5fd80ab6b23a2d21]
4.9-upstream-stable: needed
sid: released (5.14.6-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: released (4.19.208-1) [bugfix/all/usb-hso-fix-error-handling-code-of-hso_create_net_de.patch]
4.9-stretch-security: needed
diff --git a/active/CVE-2021-38204 b/active/CVE-2021-38204
index a6f8eaa6..383c4131 100644
--- a/active/CVE-2021-38204
+++ b/active/CVE-2021-38204
@@ -8,6 +8,6 @@ upstream: released (5.14-rc3) [b5fdf5c6e6bee35837e160c00ac89327bdad031b]
4.19-upstream-stable: released (4.19.199) [51fc12f4d37622fa0c481604833f98f11b1cac4f]
4.9-upstream-stable: released (4.9.277) [ae3209b9fb086661ec1de4d8f4f0b951b272bbcd]
sid: released (5.14.6-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-38205 b/active/CVE-2021-38205
index 799d9c41..76cbf09b 100644
--- a/active/CVE-2021-38205
+++ b/active/CVE-2021-38205
@@ -8,6 +8,6 @@ upstream: released (5.14-rc1) [d0d62baa7f505bd4c59cd169692ff07ec49dde37]
4.19-upstream-stable: released (4.19.204) [9322401477a6d1f9de8f18e5d6eb43a68e0b113a]
4.9-upstream-stable: released (4.9.280) [ffdc1e312e2074875147c1df90764a9bae56f11f]
sid: released (5.14.6-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: pending (4.9.284-1)
diff --git a/active/CVE-2021-38300 b/active/CVE-2021-38300
index 56c20225..a8ed9fbf 100644
--- a/active/CVE-2021-38300
+++ b/active/CVE-2021-38300
@@ -11,6 +11,6 @@ upstream: released (5.15-rc4) [37cb28ec7d3a36a5bace7063a3dba633ab110f8b]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
sid: released (5.14.6-1) [bugfix/mipsel/bpf-mips-Validate-conditional-branch-offsets.patch]
-5.10-bullseye-security: needed
+5.10-bullseye-security: released (5.10.70-1) [bugfix/mipsel/bpf-mips-Validate-conditional-branch-offsets.patch]
4.19-buster-security: needed
4.9-stretch-security: ignored "mips not supported in LTS"
diff --git a/active/CVE-2021-42008 b/active/CVE-2021-42008
index 3c409f36..c6f2cfed 100644
--- a/active/CVE-2021-42008
+++ b/active/CVE-2021-42008
@@ -7,6 +7,6 @@ upstream: released (5.14-rc7) [19d1532a187669ce86d5a2696eb7275310070793]
4.19-upstream-stable: released (4.19.205) [4e370cc081a78ee23528311ca58fd98a06768ec7]
4.9-upstream-stable: released (4.9.281) [de9171c1d9a5c2c4c5ec5e64f420681f178152fa]
sid: released (5.14.6-1)
-5.10-bullseye-security: needed
+5.10-bullseye-security: released (5.10.70-1)
4.19-buster-security: released (4.19.208-1)
4.9-stretch-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy