diff options
author | Ben Hutchings <ben@decadent.org.uk> | 2020-06-02 20:13:38 +0100 |
---|---|---|
committer | Ben Hutchings <ben@decadent.org.uk> | 2020-06-02 20:14:05 +0100 |
commit | 4e9b17898b84647b318a20b26faaac7021d040c9 (patch) | |
tree | 161149461c6128c47a8c4b39cde004ed6e14dd89 | |
parent | cd4dfb2267707d454388cc8644472e5df389926e (diff) |
Mark issues pending for stretch
-rw-r--r-- | active/CVE-2019-19319 | 2 | ||||
-rw-r--r-- | active/CVE-2019-19768 | 2 | ||||
-rw-r--r-- | active/CVE-2019-20806 | 2 | ||||
-rw-r--r-- | active/CVE-2019-2182 | 2 | ||||
-rw-r--r-- | active/CVE-2019-5108 | 2 | ||||
-rw-r--r-- | active/CVE-2020-0009 | 2 | ||||
-rw-r--r-- | active/CVE-2020-10690 | 2 | ||||
-rw-r--r-- | active/CVE-2020-10942 | 2 | ||||
-rw-r--r-- | active/CVE-2020-11494 | 2 | ||||
-rw-r--r-- | active/CVE-2020-11565 | 2 | ||||
-rw-r--r-- | active/CVE-2020-11608 | 2 | ||||
-rw-r--r-- | active/CVE-2020-11609 | 2 | ||||
-rw-r--r-- | active/CVE-2020-11668 | 2 | ||||
-rw-r--r-- | active/CVE-2020-12652 | 2 | ||||
-rw-r--r-- | active/CVE-2020-12653 | 2 | ||||
-rw-r--r-- | active/CVE-2020-12654 | 2 | ||||
-rw-r--r-- | active/CVE-2020-2732 | 2 | ||||
-rw-r--r-- | active/CVE-2020-8428 | 2 | ||||
-rw-r--r-- | active/CVE-2020-8647 | 2 | ||||
-rw-r--r-- | active/CVE-2020-8648 | 2 | ||||
-rw-r--r-- | active/CVE-2020-8649 | 2 | ||||
-rw-r--r-- | active/CVE-2020-9383 | 2 |
22 files changed, 22 insertions, 22 deletions
diff --git a/active/CVE-2019-19319 b/active/CVE-2019-19319 index 16a79b716..5cb9cfae2 100644 --- a/active/CVE-2019-19319 +++ b/active/CVE-2019-19319 @@ -21,5 +21,5 @@ upstream: released (5.2-rc1) [345c0dbf3a30872d9b204db96b5857cd00808cae] 3.16-upstream-stable: needed sid: released (5.2.6-1) 4.19-buster-security: released (4.19.87-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/ext4-protect-journal-inode-s-blocks-using-block_vali.patch] 3.16-jessie-security: pending (3.16.84-1) [bugfix/all/ext4-protect-journal-inode-s-blocks-using-block_vali.patch] diff --git a/active/CVE-2019-19768 b/active/CVE-2019-19768 index 5d9c050a8..759d219fb 100644 --- a/active/CVE-2019-19768 +++ b/active/CVE-2019-19768 @@ -11,5 +11,5 @@ upstream: released (5.6-rc4) [c780e86dd48ef6467a1146cf7d0fe1e05a635039] 3.16-upstream-stable: released (3.16.83) [4398bce1bdf258f7d67bcc38c46f5fa9546448bd] sid: released (5.5.13-1) 4.19-buster-security: released (4.19.118-1) [bugfix/all/blktrace-protect-q-blk_trace-with-rcu.patch] -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/blktrace-protect-q-blk_trace-with-rcu.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2019-20806 b/active/CVE-2019-20806 index dc4ddeaa2..23efd0d99 100644 --- a/active/CVE-2019-20806 +++ b/active/CVE-2019-20806 @@ -8,5 +8,5 @@ upstream: released (5.2-rc1) [2e7682ebfc750177a4944eeb56e97a3f05734528] 3.16-upstream-stable: N/A "Vulnerable code introduced later" sid: released (5.2.6-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/media-tw5864-fix-possible-null-pointer-dereference-i.patch] 3.16-jessie-security: N/A "Vulnerable code introduced later" diff --git a/active/CVE-2019-2182 b/active/CVE-2019-2182 index 9bcbbcabc..d77c0ac71 100644 --- a/active/CVE-2019-2182 +++ b/active/CVE-2019-2182 @@ -11,5 +11,5 @@ upstream: released (4.16-rc3) [15122ee2c515a253b0c66a3e618bc7ebe35105eb] 3.16-upstream-stable: N/A "Vulnerable code not present" sid: released (4.16.5-1) 4.19-buster-security: N/A "Fixed before branching point" -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/arm64/arm64-enforce-bbm-for-huge-io-vmap-mappings.patch] 3.16-jessie-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2019-5108 b/active/CVE-2019-5108 index 3def53d3b..d53b1745f 100644 --- a/active/CVE-2019-5108 +++ b/active/CVE-2019-5108 @@ -12,5 +12,5 @@ upstream: released (5.3) [3e493173b7841259a08c5c8e5cbe90adb349da7e] 3.16-upstream-stable: released (3.16.83) [93864704f211e55eddec0c03ca300b1cf6414d8c] sid: released (5.3.7-1) 4.19-buster-security: released (4.19.98-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/mac80211-do-not-send-layer-2-update-frame-before-aut.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-0009 b/active/CVE-2020-0009 index f4c0a7c71..2fede6049 100644 --- a/active/CVE-2020-0009 +++ b/active/CVE-2020-0009 @@ -10,5 +10,5 @@ upstream: released (5.6-rc3) [6d67b0290b4b84c477e6a2fc6e005e174d3c7786] 3.16-upstream-stable: released (3.16.83) [85216b0a3fc5f3eb08e68750175f8507d5608e37] sid: released (5.5.13-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: ignored "Driver is not enabled or supported" 3.16-jessie-security: ignored "Driver is not enabled or supported" diff --git a/active/CVE-2020-10690 b/active/CVE-2020-10690 index fd33ba4c0..70dee6c99 100644 --- a/active/CVE-2020-10690 +++ b/active/CVE-2020-10690 @@ -15,5 +15,5 @@ upstream: released (5.5-rc5) [a33121e5487b424339636b25c35d3a180eaa5f5e] 3.16-upstream-stable: released (3.16.83) [5230ef61882d2d14deb846eb6b48370694816e4c] sid: released (5.4.8-1) 4.19-buster-security: released (4.19.98-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/ptp-fix-the-race-between-the-release-of-ptp_clock-an.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-10942 b/active/CVE-2020-10942 index bd68dbb22..87c7b9c01 100644 --- a/active/CVE-2020-10942 +++ b/active/CVE-2020-10942 @@ -9,5 +9,5 @@ upstream: released (5.6-rc4) [42d84c8490f9f0931786f1623191fcab397c3d64] 3.16-upstream-stable: released (3.16.83) [e4d98e5299b19e1caad03f0b38fd41b046d0de56] sid: released (5.5.13-1) 4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/all/vhost-Check-docket-sk_family-instead-of-call-getname.patch] -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/vhost-check-docket-sk_family-instead-of-call-getname.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-11494 b/active/CVE-2020-11494 index 3acd8b58f..202d41f74 100644 --- a/active/CVE-2020-11494 +++ b/active/CVE-2020-11494 @@ -9,5 +9,5 @@ upstream: released (5.7-rc1) [b9258a2cece4ec1f020715fe3554bc2e360f6264] 3.16-upstream-stable: released (3.16.83) [08fadc32ce6239dc75fd5e869590e29bc62bbc28] sid: released (5.5.17-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/slcan-don-t-transmit-uninitialized-stack-data-in-pad.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-11565 b/active/CVE-2020-11565 index 470e7670f..e2e811faf 100644 --- a/active/CVE-2020-11565 +++ b/active/CVE-2020-11565 @@ -8,5 +8,5 @@ upstream: released (5.7-rc1) [aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd] 3.16-upstream-stable: released (3.16.83) [7ca9aeb9a22b50841c401164703c5b0a4a510aff] sid: released (5.5.17-1) 4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/all/mm-mempolicy-require-at-least-one-nodeid-for-MPOL_PR.patch] -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/mm-mempolicy-require-at-least-one-nodeid-for-mpol_pr.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-11608 b/active/CVE-2020-11608 index 4600777d7..cea750aac 100644 --- a/active/CVE-2020-11608 +++ b/active/CVE-2020-11608 @@ -8,5 +8,5 @@ upstream: released (5.7-rc1) [998912346c0da53a6dbb71fab3a138586b596b30] 3.16-upstream-stable: released (3.16.83) [39a4c51860e9695369b640962be4eb6984175384] sid: released (5.5.17-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/media-ov519-add-missing-endpoint-sanity-checks.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-11609 b/active/CVE-2020-11609 index 1166beb07..d224424c5 100644 --- a/active/CVE-2020-11609 +++ b/active/CVE-2020-11609 @@ -8,5 +8,5 @@ upstream: released (5.7-rc1) [485b06aadb933190f4bc44e006076bc27a23f205] 3.16-upstream-stable: released (3.16.83) [98d33c0103b16e64a6a4788cf81e22baf229f48e] sid: released (5.5.17-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/media-stv06xx-add-missing-descriptor-sanity-checks.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-11668 b/active/CVE-2020-11668 index 938ac9ff6..f4d2bbd4d 100644 --- a/active/CVE-2020-11668 +++ b/active/CVE-2020-11668 @@ -8,5 +8,5 @@ upstream: released (5.7-rc1) [a246b4d547708f33ff4d4b9a7a5dbac741dc89d8] 3.16-upstream-stable: released (3.16.83) [9e236e2465ff5858bed537b94b15134e3ba55e75] sid: released (5.5.17-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/media-xirlink_cit-add-missing-descriptor-sanity-chec.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-12652 b/active/CVE-2020-12652 index 1ff846eeb..c4ffe3a04 100644 --- a/active/CVE-2020-12652 +++ b/active/CVE-2020-12652 @@ -8,5 +8,5 @@ upstream: released (5.5-rc7) [28d76df18f0ad5bcf5fa48510b225f0ed262a99b] 3.16-upstream-stable: needed sid: released (5.4.19-1) 4.19-buster-security: released (4.19.98-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/scsi-mptfusion-fix-double-fetch-bug-in-ioctl.patch] 3.16-jessie-security: pending (3.16.84-1) [bugfix/all/scsi-mptfusion-fix-double-fetch-bug-in-ioctl.patch] diff --git a/active/CVE-2020-12653 b/active/CVE-2020-12653 index 46e9d7e7e..3e71d8501 100644 --- a/active/CVE-2020-12653 +++ b/active/CVE-2020-12653 @@ -8,5 +8,5 @@ upstream: released (5.6-rc1) [b70261a288ea4d2f4ac7cd04be08a9f0f2de4f4d] 3.16-upstream-stable: needed sid: released (5.5.13-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/mwifiex-fix-possible-buffer-overflows-in-mwifiex_cmd.patch] 3.16-jessie-security: pending (3.16.84-1) [bugfix/all/mwifiex-fix-possible-buffer-overflows-in-mwifiex_cmd.patch] diff --git a/active/CVE-2020-12654 b/active/CVE-2020-12654 index b3045b445..be74064e3 100644 --- a/active/CVE-2020-12654 +++ b/active/CVE-2020-12654 @@ -8,5 +8,5 @@ upstream: released (5.6-rc1) [3a9b153c5591548612c3955c9600a98150c81875] 3.16-upstream-stable: needed sid: released (5.5.13-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/mwifiex-fix-possible-buffer-overflows-in-mwifiex_ret.patch] 3.16-jessie-security: pending (3.16.84-1) [bugfix/all/mwifiex-fix-possible-buffer-overflows-in-mwifiex_ret.patch] diff --git a/active/CVE-2020-2732 b/active/CVE-2020-2732 index e0c234e66..1c297c214 100644 --- a/active/CVE-2020-2732 +++ b/active/CVE-2020-2732 @@ -14,5 +14,5 @@ upstream: released (5.6-rc4) [07721feee46b4b248402133228235318199b05ec, 35a57134 3.16-upstream-stable: released (3.16.83) [5d7476c40cd352ec82aec26f6c6d8c413eb2b17b] sid: released (5.5.13-1) 4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/x86/KVM-nVMX-Don-t-emulate-instructions-in-guest-mode.patch] -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/x86/kvm-nvmx-don-t-emulate-instructions-in-guest-mode.patch, bugfix/x86/kvm-nvmx-refactor-io-bitmap-checks-into-helper-funct.patch, bugfix/x86/kvm-nvmx-check-io-instruction-vm-exit-conditions.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-8428 b/active/CVE-2020-8428 index 3493dd15e..7a653cebc 100644 --- a/active/CVE-2020-8428 +++ b/active/CVE-2020-8428 @@ -17,5 +17,5 @@ upstream: released (5.5) [d0cb50185ae942b03c4327be322055d622dc79f6] 3.16-upstream-stable: N/A "Vulnerable code introduced later with 30aba6656f61" sid: released (5.4.19-1) 4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/all/do_last-fetch-directory-i_mode-and-i_uid-before-it-s.patch] -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/do_last-fetch-directory-i_mode-and-i_uid-before-it-s.patch] 3.16-jessie-security: N/A "Vulnerable code introduced later" diff --git a/active/CVE-2020-8647 b/active/CVE-2020-8647 index 822e1d435..66da430c0 100644 --- a/active/CVE-2020-8647 +++ b/active/CVE-2020-8647 @@ -9,5 +9,5 @@ upstream: released (5.6-rc5) [513dc792d6060d5ef572e43852683097a8420f56] 3.16-upstream-stable: released (3.16.83) [bca2e2e83484ff63ca82c9c2c905d4e580f1a35a] sid: released (5.5.13-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/vgacon-fix-a-uaf-in-vgacon_invert_region.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-8648 b/active/CVE-2020-8648 index 15a5b558d..26f413b60 100644 --- a/active/CVE-2020-8648 +++ b/active/CVE-2020-8648 @@ -10,5 +10,5 @@ upstream: released (5.6-rc3) [07e6124a1a46b4b5a9b3cacc0c306b50da87abf5, 4b70dd57 3.16-upstream-stable: released (3.16.83) [a93c3b40fc3d2264b1b11c469319c7cbefb80c46, f443603c73b85db566373875ca8890ef0910f083, a93c3b40fc3d2264b1b11c469319c7cbefb80c46] sid: released (5.5.13-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/vt-selection-close-sel_buffer-race.patch, bugfix/all/vt-selection-push-console-lock-down.patch, bugfix/all/vt-selection-push-sel_lock-up.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-8649 b/active/CVE-2020-8649 index c45af8751..3b8628fc3 100644 --- a/active/CVE-2020-8649 +++ b/active/CVE-2020-8649 @@ -11,5 +11,5 @@ upstream: released (5.6-rc5) [513dc792d6060d5ef572e43852683097a8420f56] 3.16-upstream-stable: released (3.16.83) [bca2e2e83484ff63ca82c9c2c905d4e580f1a35a] sid: released (5.5.13-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/vgacon-fix-a-uaf-in-vgacon_invert_region.patch] 3.16-jessie-security: pending (3.16.84-1) diff --git a/active/CVE-2020-9383 b/active/CVE-2020-9383 index 8a38c6346..9c417df44 100644 --- a/active/CVE-2020-9383 +++ b/active/CVE-2020-9383 @@ -8,5 +8,5 @@ upstream: released (5.6-rc4) [2e90ca68b0d2f5548804f22f0dd61145516171e3] 3.16-upstream-stable: released (3.16.83) [2f9ac30a54dc0181ddac3705cdcf4775d863c530] sid: released (5.5.13-1) 4.19-buster-security: released (4.19.118-1) -4.9-stretch-security: needed +4.9-stretch-security: pending (4.9.210-1+deb9u1) [bugfix/all/floppy-check-fdc-index-for-errors-before-assigning-i.patch] 3.16-jessie-security: pending (3.16.84-1) |