diff options
author | Ben Hutchings <ben@decadent.org.uk> | 2020-04-28 19:14:38 +0100 |
---|---|---|
committer | Ben Hutchings <ben@decadent.org.uk> | 2020-04-28 19:51:24 +0100 |
commit | 6bb70a76a40cf755a49c83df50fbd380c64b8eb7 (patch) | |
tree | d6c6e83887bd8b12a21d264da4fd0d023b3df7e5 | |
parent | 227ec493c38b253212a871c9402745a48d44f937 (diff) |
Mark issues released in 3.16.83
-rw-r--r-- | active/CVE-2015-8839 | 2 | ||||
-rw-r--r-- | active/CVE-2018-14610 | 2 | ||||
-rw-r--r-- | active/CVE-2018-14611 | 2 | ||||
-rw-r--r-- | active/CVE-2018-14612 | 2 | ||||
-rw-r--r-- | active/CVE-2018-14613 | 2 | ||||
-rw-r--r-- | active/CVE-2019-14896 | 2 | ||||
-rw-r--r-- | active/CVE-2019-14897 | 2 | ||||
-rw-r--r-- | active/CVE-2019-14901 | 2 | ||||
-rw-r--r-- | active/CVE-2019-19768 | 2 | ||||
-rw-r--r-- | active/CVE-2019-20636 | 2 | ||||
-rw-r--r-- | active/CVE-2019-5108 | 2 | ||||
-rw-r--r-- | active/CVE-2020-0009 | 2 | ||||
-rw-r--r-- | active/CVE-2020-10690 | 2 | ||||
-rw-r--r-- | active/CVE-2020-10942 | 2 | ||||
-rw-r--r-- | active/CVE-2020-11494 | 2 | ||||
-rw-r--r-- | active/CVE-2020-11565 | 2 | ||||
-rw-r--r-- | active/CVE-2020-11608 | 2 | ||||
-rw-r--r-- | active/CVE-2020-11609 | 2 | ||||
-rw-r--r-- | active/CVE-2020-11668 | 2 | ||||
-rw-r--r-- | active/CVE-2020-1749 | 2 | ||||
-rw-r--r-- | active/CVE-2020-2732 | 2 | ||||
-rw-r--r-- | active/CVE-2020-8647 | 2 | ||||
-rw-r--r-- | active/CVE-2020-8648 | 2 | ||||
-rw-r--r-- | active/CVE-2020-8649 | 2 | ||||
-rw-r--r-- | active/CVE-2020-9383 | 2 |
25 files changed, 25 insertions, 25 deletions
diff --git a/active/CVE-2015-8839 b/active/CVE-2015-8839 index 21b7d8a46..aca49f045 100644 --- a/active/CVE-2015-8839 +++ b/active/CVE-2015-8839 @@ -7,7 +7,7 @@ Bugs: upstream: released (4.5-rc1) [ea3d7209ca01da209cda6f0dea8be9cc4b7a933b, 17048e8a083fec7ad841d88ef0812707fbc7e39f, 32ebffd3bbb4162da5ff88f9a35dd32d0a28ea70, 011278485ecc3cd2a3954b5d4c73101d919bf1fa] 4.19-upstream-stable: N/A "Fixed before branch point" 4.9-upstream-stable: N/A "Fixed before branch point" -3.16-upstream-stable: pending (3.16.83) [ext4-fix-races-between-page-faults-and-hole-punching.patch, ext4-move-unlocked-dio-protection-from-ext4_alloc_file_blocks.patch, ext4-fix-races-between-buffered-io-and-collapse-insert-range.patch, ext4-fix-races-of-writeback-with-punch-hole-and-zero-range.patch] +3.16-upstream-stable: released (3.16.83) [81a2281115c28be55d3489c3a79c84db294b722a, 5c72decb78daa9e21cf0cc4d00c1fdfa70233719, 8a76993a673d694c17cd6fd6d7d9fc323fe224d4, 6a293f46d3eaafcbc4a3316f2ac80de9b1398415] 3.2-upstream-stable: ignored "Too much work to backport" sid: released (4.5.1-1) 4.19-buster-security: N/A "Fixed before branching point" diff --git a/active/CVE-2018-14610 b/active/CVE-2018-14610 index 7f67ab3c1..20e9ff557 100644 --- a/active/CVE-2018-14610 +++ b/active/CVE-2018-14610 @@ -9,7 +9,7 @@ Bugs: upstream: released (4.19-rc1) [514c7dca85a0bf40be984dab0b477403a6db901f] 4.19-upstream-stable: N/A "Fixed before branch point" 4.9-upstream-stable: released (4.9.144) [7a72f918825ddece7a4ed79583836f6f1e06e478] -3.16-upstream-stable: pending (3.16.83) [btrfs-check-that-each-block-group-has-corresponding-chunk-at-mount.patch] +3.16-upstream-stable: released (3.16.83) [5203a4d55c2c6a0c86a0ab21bfd071d407ca95a1] sid: released (4.19.9-1) 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.144-1) diff --git a/active/CVE-2018-14611 b/active/CVE-2018-14611 index b39b7d1e1..cddb58024 100644 --- a/active/CVE-2018-14611 +++ b/active/CVE-2018-14611 @@ -9,7 +9,7 @@ Bugs: upstream: released (4.19-rc1) [315409b0098fb2651d86553f0436b70502b29bb2] 4.19-upstream-stable: N/A "Fixed before branch point" 4.9-upstream-stable: released (4.9.144) [3c77b07dc365a7ed2644ca0dd38e6e40a9652d57] -3.16-upstream-stable: pending (3.16.83) [btrfs-validate-type-when-reading-a-chunk.patch] +3.16-upstream-stable: released (3.16.83) [cdfef40f9557b91384c392a9150bf0bb2b3802c7] sid: released (4.19.9-1) 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.144-1) diff --git a/active/CVE-2018-14612 b/active/CVE-2018-14612 index 1ce4b3a84..2571d0c5a 100644 --- a/active/CVE-2018-14612 +++ b/active/CVE-2018-14612 @@ -11,7 +11,7 @@ Bugs: upstream: released (4.19-rc1) [ba480dd4db9f1798541eb2d1c423fc95feee8d36, 7ef49515fa6727cb4b6f2f5b0ffbc5fc20a9f8c6] 4.19-upstream-stable: N/A "Fixed before branch point" 4.9-upstream-stable: released (4.9.144) [6f33d3d8dca8683a4df94e9944296a1a1a2a6f10, 23eb2f435a07e1e09d48ea10c4a22bc96e16fde6] -3.16-upstream-stable: pending (3.16.83) [btrfs-tree-checker-detect-invalid-and-empty-essential-trees.patch, btrfs-verify-that-every-chunk-has-corresponding-block-group-at-mount.patch] +3.16-upstream-stable: released (3.16.83) [e3f6c37c31522cc99cea96e0f0f6f536026fb058, b84f82bdb43676854de8c5196bd8738805b892ee] sid: released (4.18.8-1) 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.144-1) diff --git a/active/CVE-2018-14613 b/active/CVE-2018-14613 index fc18b0f76..b17f9272c 100644 --- a/active/CVE-2018-14613 +++ b/active/CVE-2018-14613 @@ -7,7 +7,7 @@ Bugs: upstream: released (4.19-rc1) [fce466eab7ac6baa9d2dcd88abcf945be3d4a089] 4.19-upstream-stable: N/A "Fixed before branch point" 4.9-upstream-stable: released (4.9.144) [058e388e42c8dc5b6ce6248990c75a0459e20197] -3.16-upstream-stable: pending (3.16.83) [btrfs-tree-checker-verify-block_group_item.patch] +3.16-upstream-stable: released (3.16.83) [df8ecef7a35de12986676edc45fd841e6d788ba8] sid: released (4.19.9-1) 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.144-1) diff --git a/active/CVE-2019-14896 b/active/CVE-2019-14896 index 649dbaa90..8f67178a1 100644 --- a/active/CVE-2019-14896 +++ b/active/CVE-2019-14896 @@ -10,7 +10,7 @@ Bugs: upstream: released (5.5) [e5e884b42639c74b5b57dc277909915c0aefc8bb] 4.19-upstream-stable: released (4.19.100) cbd56515be5a8ea97134ef762b7a2923b94cb9c4] 4.9-upstream-stable: released (4.9.212) [b5e6f199de3b7f16b641c4ec5ac92906af1a9232] -3.16-upstream-stable: pending (3.16.83) [libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch] +3.16-upstream-stable: released (3.16.83) [e4646070f91312414af0ca9332a79b7153150fae] sid: released (5.4.19-1) 4.19-buster-security: released (4.19.98-1) [bugfix/all/libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch] 4.9-stretch-security: released (4.9.210-1) [bugfix/all/libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch] diff --git a/active/CVE-2019-14897 b/active/CVE-2019-14897 index e4d272b29..5456af053 100644 --- a/active/CVE-2019-14897 +++ b/active/CVE-2019-14897 @@ -11,7 +11,7 @@ Bugs: upstream: released (5.5) [e5e884b42639c74b5b57dc277909915c0aefc8bb] 4.19-upstream-stable: released (4.19.100) cbd56515be5a8ea97134ef762b7a2923b94cb9c4] 4.9-upstream-stable: released (4.9.212) [e5e884b42639c74b5b57dc277909915c0aefc8bb] -3.16-upstream-stable: pending (3.16.83) [libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch] +3.16-upstream-stable: released (3.16.83) [e4646070f91312414af0ca9332a79b7153150fae] sid: released (5.4.19-1) 4.19-buster-security: released (4.19.98-1) [bugfix/all/libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch] 4.9-stretch-security: released (4.9.210-1) [bugfix/all/libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch] diff --git a/active/CVE-2019-14901 b/active/CVE-2019-14901 index d4365bda9..d7a4732dc 100644 --- a/active/CVE-2019-14901 +++ b/active/CVE-2019-14901 @@ -9,7 +9,7 @@ Bugs: upstream: released (5.5-rc3) [1e58252e334dc3f3756f424a157d1b7484464c40] 4.19-upstream-stable: released (4.19.95) [21f08020dd8519baf209348c345131a8967e3cef] 4.9-upstream-stable: released (4.9.217) [cb87b895f1468df7a163a6c665bf106a4d26f8c1] -3.16-upstream-stable: pending (3.16.83) [mwifiex-fix-heap-overflow-in-mmwifiex_process_tdls_action_frame.patch] +3.16-upstream-stable: released (3.16.83) [ef0449fb4c94e52c1f5f7170b52a738acf9af5ff] sid: released (5.4.13-1) 4.19-buster-security: released (4.19.98-1) 4.9-stretch-security: released (4.9.210-1) [bugfix/all/mwifiex-fix-heap-overflow-in-mmwifiex_process_tdls_a.patch] diff --git a/active/CVE-2019-19768 b/active/CVE-2019-19768 index 94d3d86f7..e261859c9 100644 --- a/active/CVE-2019-19768 +++ b/active/CVE-2019-19768 @@ -8,7 +8,7 @@ Bugs: upstream: released (5.6-rc4) [c780e86dd48ef6467a1146cf7d0fe1e05a635039] 4.19-upstream-stable: needed 4.9-upstream-stable: needed -3.16-upstream-stable: pending (3.16.83) [blktrace-protect-q-blk_trace-with-rcu.patch] +3.16-upstream-stable: released (3.16.83) [4398bce1bdf258f7d67bcc38c46f5fa9546448bd] sid: released (5.5.13-1) 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2019-20636 b/active/CVE-2019-20636 index 0b44c5bfc..f2b0fe850 100644 --- a/active/CVE-2019-20636 +++ b/active/CVE-2019-20636 @@ -5,7 +5,7 @@ Bugs: upstream: released (5.5-rc6) [cb222aed03d798fc074be55e59d9a112338ee784] 4.19-upstream-stable: released (4.19.96) [f5b9bfbe94a042a2e3806efa4c6e1b6ddb4292c4] 4.9-upstream-stable: released (4.9.210) [5f27f97dfed4aa29fb95b98bf5911763bd3ef038] -3.16-upstream-stable: pending (3.16.83) [input-add-safety-guards-to-input_set_keycode.patch] +3.16-upstream-stable: released (3.16.83) [4af47d3cc875e43a523f6d3b3edef2ca785ccf27] sid: released (5.4.13-1) 4.19-buster-security: released (4.19.98-1) 4.9-stretch-security: released (4.9.210-1) diff --git a/active/CVE-2019-5108 b/active/CVE-2019-5108 index 6de1dc5a2..3b0aeb1ff 100644 --- a/active/CVE-2019-5108 +++ b/active/CVE-2019-5108 @@ -9,7 +9,7 @@ Bugs: upstream: released (5.3) [3e493173b7841259a08c5c8e5cbe90adb349da7e] 4.19-upstream-stable: released (4.19.97) [8f483142b0bb278f67eabccbe3d6a0e8c45284ad] 4.9-upstream-stable: released (4.9.211) [ca60f42d7965af9f22392caa4074ab0f58c7e1fe] -3.16-upstream-stable: pending (3.16.83) [mac80211-do-not-send-layer-2-update-frame-before-authorization.patch] +3.16-upstream-stable: released (3.16.83) [93864704f211e55eddec0c03ca300b1cf6414d8c] sid: released (5.3.7-1) 4.19-buster-security: released (4.19.98-1) 4.9-stretch-security: needed diff --git a/active/CVE-2020-0009 b/active/CVE-2020-0009 index 679db214a..db0325982 100644 --- a/active/CVE-2020-0009 +++ b/active/CVE-2020-0009 @@ -7,7 +7,7 @@ Bugs: upstream: released (5.6-rc3) [6d67b0290b4b84c477e6a2fc6e005e174d3c7786] 4.19-upstream-stable: released (4.19.107) [a4307700608e43dcf9b8abf1ee74f68227e9c61a] 4.9-upstream-stable: released (4.9.215) [a7fc5dbd17127c7301b0aefc2bcf1f54169c7383] -3.16-upstream-stable: pending (3.16.83) [staging-android-ashmem-disallow-ashmem-memory-from-being-remapped.patch] +3.16-upstream-stable: released (3.16.83) [85216b0a3fc5f3eb08e68750175f8507d5608e37] sid: released (5.5.13-1) 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-10690 b/active/CVE-2020-10690 index 3b34ed418..2aebf7b78 100644 --- a/active/CVE-2020-10690 +++ b/active/CVE-2020-10690 @@ -12,7 +12,7 @@ Bugs: upstream: released (5.5-rc5) [a33121e5487b424339636b25c35d3a180eaa5f5e] 4.19-upstream-stable: released (4.19.93) [0393b8720128d5b39db8523e5bfbfc689f18c37c] 4.9-upstream-stable: needed -3.16-upstream-stable: pending (3.16.83) [ptp-fix-the-race-between-the-release-of-ptp_clock-and-cdev.patch] +3.16-upstream-stable: released (3.16.83) [5230ef61882d2d14deb846eb6b48370694816e4c] sid: released (5.4.8-1) 4.19-buster-security: released (4.19.98-1) 4.9-stretch-security: needed diff --git a/active/CVE-2020-10942 b/active/CVE-2020-10942 index e0e01b193..2d3a86d9b 100644 --- a/active/CVE-2020-10942 +++ b/active/CVE-2020-10942 @@ -6,7 +6,7 @@ Bugs: upstream: released (5.6-rc4) [42d84c8490f9f0931786f1623191fcab397c3d64] 4.19-upstream-stable: released (4.19.108) [ad598a48fe61c6c2407f08a807cb7a2ea83386b3] 4.9-upstream-stable: released (4.9.216) [7f574e92e4474f1b33425c4ee9ba48cd4fbe7d75] -3.16-upstream-stable: pending (3.16.83) [vhost-check-docket-sk_family-instead-of-call-getname.patch] +3.16-upstream-stable: released (3.16.83) [e4d98e5299b19e1caad03f0b38fd41b046d0de56] sid: released (5.5.13-1) 4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/all/vhost-Check-docket-sk_family-instead-of-call-getname.patch] 4.9-stretch-security: needed diff --git a/active/CVE-2020-11494 b/active/CVE-2020-11494 index bed844a0a..d04b791f1 100644 --- a/active/CVE-2020-11494 +++ b/active/CVE-2020-11494 @@ -6,7 +6,7 @@ Bugs: upstream: released (5.7-rc1) [b9258a2cece4ec1f020715fe3554bc2e360f6264] 4.19-upstream-stable: released (4.19.115) [b774578329afb238ccd504477731129aa15e9ec2] 4.9-upstream-stable: released (4.9.219) [925c631e84d77a72188101258878ac58a646d540] -3.16-upstream-stable: pending (3.16.83) [slcan-don-t-transmit-uninitialized-stack-data-in-padding.patch] +3.16-upstream-stable: released (3.16.83) [08fadc32ce6239dc75fd5e869590e29bc62bbc28] sid: released (5.5.17-1) 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-11565 b/active/CVE-2020-11565 index ec1457141..8cec8f11b 100644 --- a/active/CVE-2020-11565 +++ b/active/CVE-2020-11565 @@ -5,7 +5,7 @@ Bugs: upstream: released (5.7-rc1) [aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd] 4.19-upstream-stable: released (4.19.115) [fa138035f104ae14651ee3217d81fc16cd3aba4d] 4.9-upstream-stable: released (4.9.219) [c5544e72014cdb0a739f6971fb3dd4fb641b392c] -3.16-upstream-stable: pending (3.16.83) [mm-mempolicy-require-at-least-one-nodeid-for-mpol_preferred.patch] +3.16-upstream-stable: released (3.16.83) [7ca9aeb9a22b50841c401164703c5b0a4a510aff] sid: released (5.5.17-1) 4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/all/mm-mempolicy-require-at-least-one-nodeid-for-MPOL_PR.patch] 4.9-stretch-security: needed diff --git a/active/CVE-2020-11608 b/active/CVE-2020-11608 index 39394effc..a3ae2d2b1 100644 --- a/active/CVE-2020-11608 +++ b/active/CVE-2020-11608 @@ -5,7 +5,7 @@ Bugs: upstream: released (5.7-rc1) [998912346c0da53a6dbb71fab3a138586b596b30] 4.19-upstream-stable: released (4.19.114) [747a7431661ab3c22ad1e721558bdf9e3d53d4a6] 4.9-upstream-stable: released (4.9.218) [03e73c3ef017580482d8e4de2db2bac9505facca] -3.16-upstream-stable: pending (3.16.83) [media-ov519-add-missing-endpoint-sanity-checks.patch] +3.16-upstream-stable: released (3.16.83) [39a4c51860e9695369b640962be4eb6984175384] sid: released (5.5.17-1) 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-11609 b/active/CVE-2020-11609 index 4af2c4962..2a57e305a 100644 --- a/active/CVE-2020-11609 +++ b/active/CVE-2020-11609 @@ -5,7 +5,7 @@ Bugs: upstream: released (5.7-rc1) [485b06aadb933190f4bc44e006076bc27a23f205] 4.19-upstream-stable: released (4.19.114) [70764334b2bcb15c67dfbd912d9a9f7076f6d0df] 4.9-upstream-stable: released (4.9.218) [be6fdd999bcc66cbfde80efbdc16cfd8a3290e38] -3.16-upstream-stable: pending (3.16.83) [media-stv06xx-add-missing-descriptor-sanity-checks.patch] +3.16-upstream-stable: released (3.16.83) [98d33c0103b16e64a6a4788cf81e22baf229f48e] sid: released (5.5.17-1) 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-11668 b/active/CVE-2020-11668 index 7604bacb7..fea400bf2 100644 --- a/active/CVE-2020-11668 +++ b/active/CVE-2020-11668 @@ -5,7 +5,7 @@ Bugs: upstream: released (5.7-rc1) [a246b4d547708f33ff4d4b9a7a5dbac741dc89d8] 4.19-upstream-stable: released (4.19.114) [5d064d7f0327d9425c5f63fa96efc70a74032d8b] 4.9-upstream-stable: released (4.9.218) [8f08a2bb2199a4511bea29e9a130b449f8c1a581] -3.16-upstream-stable: pending (3.16.83) [media-xirlink_cit-add-missing-descriptor-sanity-checks.patch] +3.16-upstream-stable: released (3.16.83) [9e236e2465ff5858bed537b94b15134e3ba55e75] sid: released (5.5.17-1) 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-1749 b/active/CVE-2020-1749 index 3f16a9d03..86c33aad0 100644 --- a/active/CVE-2020-1749 +++ b/active/CVE-2020-1749 @@ -10,7 +10,7 @@ Bugs: upstream: released (5.5-rc1) [6c8991f41546c3c472503dff1ea9daaddf9331c2] 4.19-upstream-stable: needed 4.9-upstream-stable: needed -3.16-upstream-stable: pending (3.16.83) [net-ipv6_stub-use-ip6_dst_lookup_flow-instead-of-ip6_dst_lookup.patch] +3.16-upstream-stable: released (3.16.83) [b9f3e457098ea76f2d69bfc369bae1fd0cf2a6e5] sid: released (5.4.6-1) 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-2732 b/active/CVE-2020-2732 index 397e820ca..df2e903ef 100644 --- a/active/CVE-2020-2732 +++ b/active/CVE-2020-2732 @@ -11,7 +11,7 @@ Bugs: upstream: released (5.6-rc4) [07721feee46b4b248402133228235318199b05ec, 35a571346a94fb93b5b3b6a599675ef3384bc75c, e71237d3ff1abf9f3388337cfebf53b96df2020d] 4.19-upstream-stable: released (4.19.107) [ed9e97c35b454ceb1da4f65c318015a7ab298dae, 85dd0eb771e8cef7839dbd4cb61acde0b86ecd9e, e5c0857bd5ccf34d93b5b1ea858ab3d81a685b08] 4.9-upstream-stable: released (4.9.215) [86dc39e580d8e3ffa42c8157d3e28249fd9a12c5, f3e0dfb310e6a6f0190dbb3d6b337513b548507b, 35523a2d9918e36ad4fa6c9c0176279d7c1f4291] -3.16-upstream-stable: pending (3.16.83) [kvm-nvmx-don-t-emulate-instructions-in-guest-mode.patch] +3.16-upstream-stable: released (3.16.83) [5d7476c40cd352ec82aec26f6c6d8c413eb2b17b] sid: released (5.5.13-1) 4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/x86/KVM-nVMX-Don-t-emulate-instructions-in-guest-mode.patch] 4.9-stretch-security: needed diff --git a/active/CVE-2020-8647 b/active/CVE-2020-8647 index 2e0a8ea9c..945694314 100644 --- a/active/CVE-2020-8647 +++ b/active/CVE-2020-8647 @@ -6,7 +6,7 @@ Bugs: upstream: released (5.6-rc5) [513dc792d6060d5ef572e43852683097a8420f56] 4.19-upstream-stable: released (4.19.109) [7abe1e0a874418b07524c9e07225df1cbb421ce9] 4.9-upstream-stable: released (4.9.216) 1f04adb4d691ed703b1fbc55d99f622b96cedecc] -3.16-upstream-stable: pending (3.16.83) [vgacon-fix-a-uaf-in-vgacon_invert_region.patch] +3.16-upstream-stable: released (3.16.83) [bca2e2e83484ff63ca82c9c2c905d4e580f1a35a] sid: released (5.5.13-1) 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-8648 b/active/CVE-2020-8648 index dc8a666c8..1b4c50020 100644 --- a/active/CVE-2020-8648 +++ b/active/CVE-2020-8648 @@ -7,7 +7,7 @@ Bugs: upstream: released (5.6-rc3) [07e6124a1a46b4b5a9b3cacc0c306b50da87abf5, 4b70dd57a15d2f4685ac6e38056bad93e81e982f, 07e6124a1a46b4b5a9b3cacc0c306b50da87abf5] 4.19-upstream-stable: released (4.19.109) [31559b59040fc0e6ad363642112d4eb03ad4ebb7, efaef8463e1a9c20aa19c3de2b2d19f885e0315e, b4492f1e7456bd162714c0ec2815c2749d930844] 4.9-upstream-stable: released (4.9.216) [290a9381ccc16131c6ccc19940589141985db6b1, ccd35863147dd447110b726a0d4911ab686aade9, e5be0e24ffc7f5783a3864b5b958088ed15be9e8] -3.16-upstream-stable: pending (3.16.83) [vt-selection-close-sel_buffer-race.patch, vt-selection-push-console-lock-down.patch, vt-selection-push-sel_lock-up.patch] +3.16-upstream-stable: released (3.16.83) [a93c3b40fc3d2264b1b11c469319c7cbefb80c46, f443603c73b85db566373875ca8890ef0910f083, a93c3b40fc3d2264b1b11c469319c7cbefb80c46] sid: released (5.5.13-1) 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-8649 b/active/CVE-2020-8649 index cb18af786..3faa07d92 100644 --- a/active/CVE-2020-8649 +++ b/active/CVE-2020-8649 @@ -8,7 +8,7 @@ Bugs: upstream: released (5.6-rc5) [513dc792d6060d5ef572e43852683097a8420f56] 4.19-upstream-stable: released (4.19.109) [7abe1e0a874418b07524c9e07225df1cbb421ce9] 4.9-upstream-stable: released (4.9.216) [1f04adb4d691ed703b1fbc55d99f622b96cedecc] -3.16-upstream-stable: pending (3.16.83) [vgacon-fix-a-uaf-in-vgacon_invert_region.patch] +3.16-upstream-stable: released (3.16.83) [bca2e2e83484ff63ca82c9c2c905d4e580f1a35a] sid: released (5.5.13-1) 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-9383 b/active/CVE-2020-9383 index 62f00ecd2..b3e0b5180 100644 --- a/active/CVE-2020-9383 +++ b/active/CVE-2020-9383 @@ -5,7 +5,7 @@ Bugs: upstream: released (5.6-rc4) [2e90ca68b0d2f5548804f22f0dd61145516171e3] 4.19-upstream-stable: released (4.19.107) [c8fd87c53a1509162b910cec91c0c46753c58f9a] 4.9-upstream-stable: released (4.9.215) [5fbaa66c2a51c2260add842bd12cbc79715c5249] -3.16-upstream-stable: pending (3.16.83) [floppy-check-fdc-index-for-errors-before-assigning-it.patch] +3.16-upstream-stable: released (3.16.83) [2f9ac30a54dc0181ddac3705cdcf4775d863c530] sid: released (5.5.13-1) 4.19-buster-security: needed 4.9-stretch-security: needed |