summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2020-06-02 20:13:38 +0100
committerBen Hutchings <ben@decadent.org.uk>2020-06-02 20:14:05 +0100
commit4e9b17898b84647b318a20b26faaac7021d040c9 (patch)
tree161149461c6128c47a8c4b39cde004ed6e14dd89
parentcd4dfb2267707d454388cc8644472e5df389926e (diff)
Mark issues pending for stretch
-rw-r--r--active/CVE-2019-193192
-rw-r--r--active/CVE-2019-197682
-rw-r--r--active/CVE-2019-208062
-rw-r--r--active/CVE-2019-21822
-rw-r--r--active/CVE-2019-51082
-rw-r--r--active/CVE-2020-00092
-rw-r--r--active/CVE-2020-106902
-rw-r--r--active/CVE-2020-109422
-rw-r--r--active/CVE-2020-114942
-rw-r--r--active/CVE-2020-115652
-rw-r--r--active/CVE-2020-116082
-rw-r--r--active/CVE-2020-116092
-rw-r--r--active/CVE-2020-116682
-rw-r--r--active/CVE-2020-126522
-rw-r--r--active/CVE-2020-126532
-rw-r--r--active/CVE-2020-126542
-rw-r--r--active/CVE-2020-27322
-rw-r--r--active/CVE-2020-84282
-rw-r--r--active/CVE-2020-86472
-rw-r--r--active/CVE-2020-86482
-rw-r--r--active/CVE-2020-86492
-rw-r--r--active/CVE-2020-93832
22 files changed, 22 insertions, 22 deletions
diff --git a/active/CVE-2019-19319 b/active/CVE-2019-19319
index 16a79b716..5cb9cfae2 100644
--- a/active/CVE-2019-19319
+++ b/active/CVE-2019-19319
@@ -21,5 +21,5 @@ upstream: released (5.2-rc1) [345c0dbf3a30872d9b204db96b5857cd00808cae]
3.16-upstream-stable: needed
sid: released (5.2.6-1)
4.19-buster-security: released (4.19.87-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/ext4-protect-journal-inode-s-blocks-using-block_vali.patch]
3.16-jessie-security: pending (3.16.84-1) [bugfix/all/ext4-protect-journal-inode-s-blocks-using-block_vali.patch]
diff --git a/active/CVE-2019-19768 b/active/CVE-2019-19768
index 5d9c050a8..759d219fb 100644
--- a/active/CVE-2019-19768
+++ b/active/CVE-2019-19768
@@ -11,5 +11,5 @@ upstream: released (5.6-rc4) [c780e86dd48ef6467a1146cf7d0fe1e05a635039]
3.16-upstream-stable: released (3.16.83) [4398bce1bdf258f7d67bcc38c46f5fa9546448bd]
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.118-1) [bugfix/all/blktrace-protect-q-blk_trace-with-rcu.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/blktrace-protect-q-blk_trace-with-rcu.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2019-20806 b/active/CVE-2019-20806
index dc4ddeaa2..23efd0d99 100644
--- a/active/CVE-2019-20806
+++ b/active/CVE-2019-20806
@@ -8,5 +8,5 @@ upstream: released (5.2-rc1) [2e7682ebfc750177a4944eeb56e97a3f05734528]
3.16-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.2.6-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/media-tw5864-fix-possible-null-pointer-dereference-i.patch]
3.16-jessie-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2019-2182 b/active/CVE-2019-2182
index 9bcbbcabc..d77c0ac71 100644
--- a/active/CVE-2019-2182
+++ b/active/CVE-2019-2182
@@ -11,5 +11,5 @@ upstream: released (4.16-rc3) [15122ee2c515a253b0c66a3e618bc7ebe35105eb]
3.16-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.16.5-1)
4.19-buster-security: N/A "Fixed before branching point"
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/arm64/arm64-enforce-bbm-for-huge-io-vmap-mappings.patch]
3.16-jessie-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2019-5108 b/active/CVE-2019-5108
index 3def53d3b..d53b1745f 100644
--- a/active/CVE-2019-5108
+++ b/active/CVE-2019-5108
@@ -12,5 +12,5 @@ upstream: released (5.3) [3e493173b7841259a08c5c8e5cbe90adb349da7e]
3.16-upstream-stable: released (3.16.83) [93864704f211e55eddec0c03ca300b1cf6414d8c]
sid: released (5.3.7-1)
4.19-buster-security: released (4.19.98-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/mac80211-do-not-send-layer-2-update-frame-before-aut.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-0009 b/active/CVE-2020-0009
index f4c0a7c71..2fede6049 100644
--- a/active/CVE-2020-0009
+++ b/active/CVE-2020-0009
@@ -10,5 +10,5 @@ upstream: released (5.6-rc3) [6d67b0290b4b84c477e6a2fc6e005e174d3c7786]
3.16-upstream-stable: released (3.16.83) [85216b0a3fc5f3eb08e68750175f8507d5608e37]
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: ignored "Driver is not enabled or supported"
3.16-jessie-security: ignored "Driver is not enabled or supported"
diff --git a/active/CVE-2020-10690 b/active/CVE-2020-10690
index fd33ba4c0..70dee6c99 100644
--- a/active/CVE-2020-10690
+++ b/active/CVE-2020-10690
@@ -15,5 +15,5 @@ upstream: released (5.5-rc5) [a33121e5487b424339636b25c35d3a180eaa5f5e]
3.16-upstream-stable: released (3.16.83) [5230ef61882d2d14deb846eb6b48370694816e4c]
sid: released (5.4.8-1)
4.19-buster-security: released (4.19.98-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/ptp-fix-the-race-between-the-release-of-ptp_clock-an.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-10942 b/active/CVE-2020-10942
index bd68dbb22..87c7b9c01 100644
--- a/active/CVE-2020-10942
+++ b/active/CVE-2020-10942
@@ -9,5 +9,5 @@ upstream: released (5.6-rc4) [42d84c8490f9f0931786f1623191fcab397c3d64]
3.16-upstream-stable: released (3.16.83) [e4d98e5299b19e1caad03f0b38fd41b046d0de56]
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/all/vhost-Check-docket-sk_family-instead-of-call-getname.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/vhost-check-docket-sk_family-instead-of-call-getname.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-11494 b/active/CVE-2020-11494
index 3acd8b58f..202d41f74 100644
--- a/active/CVE-2020-11494
+++ b/active/CVE-2020-11494
@@ -9,5 +9,5 @@ upstream: released (5.7-rc1) [b9258a2cece4ec1f020715fe3554bc2e360f6264]
3.16-upstream-stable: released (3.16.83) [08fadc32ce6239dc75fd5e869590e29bc62bbc28]
sid: released (5.5.17-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/slcan-don-t-transmit-uninitialized-stack-data-in-pad.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-11565 b/active/CVE-2020-11565
index 470e7670f..e2e811faf 100644
--- a/active/CVE-2020-11565
+++ b/active/CVE-2020-11565
@@ -8,5 +8,5 @@ upstream: released (5.7-rc1) [aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd]
3.16-upstream-stable: released (3.16.83) [7ca9aeb9a22b50841c401164703c5b0a4a510aff]
sid: released (5.5.17-1)
4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/all/mm-mempolicy-require-at-least-one-nodeid-for-MPOL_PR.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/mm-mempolicy-require-at-least-one-nodeid-for-mpol_pr.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-11608 b/active/CVE-2020-11608
index 4600777d7..cea750aac 100644
--- a/active/CVE-2020-11608
+++ b/active/CVE-2020-11608
@@ -8,5 +8,5 @@ upstream: released (5.7-rc1) [998912346c0da53a6dbb71fab3a138586b596b30]
3.16-upstream-stable: released (3.16.83) [39a4c51860e9695369b640962be4eb6984175384]
sid: released (5.5.17-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/media-ov519-add-missing-endpoint-sanity-checks.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-11609 b/active/CVE-2020-11609
index 1166beb07..d224424c5 100644
--- a/active/CVE-2020-11609
+++ b/active/CVE-2020-11609
@@ -8,5 +8,5 @@ upstream: released (5.7-rc1) [485b06aadb933190f4bc44e006076bc27a23f205]
3.16-upstream-stable: released (3.16.83) [98d33c0103b16e64a6a4788cf81e22baf229f48e]
sid: released (5.5.17-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/media-stv06xx-add-missing-descriptor-sanity-checks.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-11668 b/active/CVE-2020-11668
index 938ac9ff6..f4d2bbd4d 100644
--- a/active/CVE-2020-11668
+++ b/active/CVE-2020-11668
@@ -8,5 +8,5 @@ upstream: released (5.7-rc1) [a246b4d547708f33ff4d4b9a7a5dbac741dc89d8]
3.16-upstream-stable: released (3.16.83) [9e236e2465ff5858bed537b94b15134e3ba55e75]
sid: released (5.5.17-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/media-xirlink_cit-add-missing-descriptor-sanity-chec.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-12652 b/active/CVE-2020-12652
index 1ff846eeb..c4ffe3a04 100644
--- a/active/CVE-2020-12652
+++ b/active/CVE-2020-12652
@@ -8,5 +8,5 @@ upstream: released (5.5-rc7) [28d76df18f0ad5bcf5fa48510b225f0ed262a99b]
3.16-upstream-stable: needed
sid: released (5.4.19-1)
4.19-buster-security: released (4.19.98-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/scsi-mptfusion-fix-double-fetch-bug-in-ioctl.patch]
3.16-jessie-security: pending (3.16.84-1) [bugfix/all/scsi-mptfusion-fix-double-fetch-bug-in-ioctl.patch]
diff --git a/active/CVE-2020-12653 b/active/CVE-2020-12653
index 46e9d7e7e..3e71d8501 100644
--- a/active/CVE-2020-12653
+++ b/active/CVE-2020-12653
@@ -8,5 +8,5 @@ upstream: released (5.6-rc1) [b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d]
3.16-upstream-stable: needed
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/mwifiex-fix-possible-buffer-overflows-in-mwifiex_cmd.patch]
3.16-jessie-security: pending (3.16.84-1) [bugfix/all/mwifiex-fix-possible-buffer-overflows-in-mwifiex_cmd.patch]
diff --git a/active/CVE-2020-12654 b/active/CVE-2020-12654
index b3045b445..be74064e3 100644
--- a/active/CVE-2020-12654
+++ b/active/CVE-2020-12654
@@ -8,5 +8,5 @@ upstream: released (5.6-rc1) [3a9b153c5591548612c3955c9600a98150c81875]
3.16-upstream-stable: needed
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/mwifiex-fix-possible-buffer-overflows-in-mwifiex_ret.patch]
3.16-jessie-security: pending (3.16.84-1) [bugfix/all/mwifiex-fix-possible-buffer-overflows-in-mwifiex_ret.patch]
diff --git a/active/CVE-2020-2732 b/active/CVE-2020-2732
index e0c234e66..1c297c214 100644
--- a/active/CVE-2020-2732
+++ b/active/CVE-2020-2732
@@ -14,5 +14,5 @@ upstream: released (5.6-rc4) [07721feee46b4b248402133228235318199b05ec, 35a57134
3.16-upstream-stable: released (3.16.83) [5d7476c40cd352ec82aec26f6c6d8c413eb2b17b]
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/x86/KVM-nVMX-Don-t-emulate-instructions-in-guest-mode.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/x86/kvm-nvmx-don-t-emulate-instructions-in-guest-mode.patch, bugfix/x86/kvm-nvmx-refactor-io-bitmap-checks-into-helper-funct.patch, bugfix/x86/kvm-nvmx-check-io-instruction-vm-exit-conditions.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-8428 b/active/CVE-2020-8428
index 3493dd15e..7a653cebc 100644
--- a/active/CVE-2020-8428
+++ b/active/CVE-2020-8428
@@ -17,5 +17,5 @@ upstream: released (5.5) [d0cb50185ae942b03c4327be322055d622dc79f6]
3.16-upstream-stable: N/A "Vulnerable code introduced later with 30aba6656f61"
sid: released (5.4.19-1)
4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/all/do_last-fetch-directory-i_mode-and-i_uid-before-it-s.patch]
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/do_last-fetch-directory-i_mode-and-i_uid-before-it-s.patch]
3.16-jessie-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2020-8647 b/active/CVE-2020-8647
index 822e1d435..66da430c0 100644
--- a/active/CVE-2020-8647
+++ b/active/CVE-2020-8647
@@ -9,5 +9,5 @@ upstream: released (5.6-rc5) [513dc792d6060d5ef572e43852683097a8420f56]
3.16-upstream-stable: released (3.16.83) [bca2e2e83484ff63ca82c9c2c905d4e580f1a35a]
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/vgacon-fix-a-uaf-in-vgacon_invert_region.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-8648 b/active/CVE-2020-8648
index 15a5b558d..26f413b60 100644
--- a/active/CVE-2020-8648
+++ b/active/CVE-2020-8648
@@ -10,5 +10,5 @@ upstream: released (5.6-rc3) [07e6124a1a46b4b5a9b3cacc0c306b50da87abf5, 4b70dd57
3.16-upstream-stable: released (3.16.83) [a93c3b40fc3d2264b1b11c469319c7cbefb80c46, f443603c73b85db566373875ca8890ef0910f083, a93c3b40fc3d2264b1b11c469319c7cbefb80c46]
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/vt-selection-close-sel_buffer-race.patch, bugfix/all/vt-selection-push-console-lock-down.patch, bugfix/all/vt-selection-push-sel_lock-up.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-8649 b/active/CVE-2020-8649
index c45af8751..3b8628fc3 100644
--- a/active/CVE-2020-8649
+++ b/active/CVE-2020-8649
@@ -11,5 +11,5 @@ upstream: released (5.6-rc5) [513dc792d6060d5ef572e43852683097a8420f56]
3.16-upstream-stable: released (3.16.83) [bca2e2e83484ff63ca82c9c2c905d4e580f1a35a]
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/vgacon-fix-a-uaf-in-vgacon_invert_region.patch]
3.16-jessie-security: pending (3.16.84-1)
diff --git a/active/CVE-2020-9383 b/active/CVE-2020-9383
index 8a38c6346..9c417df44 100644
--- a/active/CVE-2020-9383
+++ b/active/CVE-2020-9383
@@ -8,5 +8,5 @@ upstream: released (5.6-rc4) [2e90ca68b0d2f5548804f22f0dd61145516171e3]
3.16-upstream-stable: released (3.16.83) [2f9ac30a54dc0181ddac3705cdcf4775d863c530]
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.118-1)
-4.9-stretch-security: needed
+4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/floppy-check-fdc-index-for-errors-before-assigning-i.patch]
3.16-jessie-security: pending (3.16.84-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy