summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2020-04-28 19:14:38 +0100
committerBen Hutchings <ben@decadent.org.uk>2020-04-28 19:51:24 +0100
commit6bb70a76a40cf755a49c83df50fbd380c64b8eb7 (patch)
treed6c6e83887bd8b12a21d264da4fd0d023b3df7e5
parent227ec493c38b253212a871c9402745a48d44f937 (diff)
Mark issues released in 3.16.83
-rw-r--r--active/CVE-2015-88392
-rw-r--r--active/CVE-2018-146102
-rw-r--r--active/CVE-2018-146112
-rw-r--r--active/CVE-2018-146122
-rw-r--r--active/CVE-2018-146132
-rw-r--r--active/CVE-2019-148962
-rw-r--r--active/CVE-2019-148972
-rw-r--r--active/CVE-2019-149012
-rw-r--r--active/CVE-2019-197682
-rw-r--r--active/CVE-2019-206362
-rw-r--r--active/CVE-2019-51082
-rw-r--r--active/CVE-2020-00092
-rw-r--r--active/CVE-2020-106902
-rw-r--r--active/CVE-2020-109422
-rw-r--r--active/CVE-2020-114942
-rw-r--r--active/CVE-2020-115652
-rw-r--r--active/CVE-2020-116082
-rw-r--r--active/CVE-2020-116092
-rw-r--r--active/CVE-2020-116682
-rw-r--r--active/CVE-2020-17492
-rw-r--r--active/CVE-2020-27322
-rw-r--r--active/CVE-2020-86472
-rw-r--r--active/CVE-2020-86482
-rw-r--r--active/CVE-2020-86492
-rw-r--r--active/CVE-2020-93832
25 files changed, 25 insertions, 25 deletions
diff --git a/active/CVE-2015-8839 b/active/CVE-2015-8839
index 21b7d8a46..aca49f045 100644
--- a/active/CVE-2015-8839
+++ b/active/CVE-2015-8839
@@ -7,7 +7,7 @@ Bugs:
upstream: released (4.5-rc1) [ea3d7209ca01da209cda6f0dea8be9cc4b7a933b, 17048e8a083fec7ad841d88ef0812707fbc7e39f, 32ebffd3bbb4162da5ff88f9a35dd32d0a28ea70, 011278485ecc3cd2a3954b5d4c73101d919bf1fa]
4.19-upstream-stable: N/A "Fixed before branch point"
4.9-upstream-stable: N/A "Fixed before branch point"
-3.16-upstream-stable: pending (3.16.83) [ext4-fix-races-between-page-faults-and-hole-punching.patch, ext4-move-unlocked-dio-protection-from-ext4_alloc_file_blocks.patch, ext4-fix-races-between-buffered-io-and-collapse-insert-range.patch, ext4-fix-races-of-writeback-with-punch-hole-and-zero-range.patch]
+3.16-upstream-stable: released (3.16.83) [81a2281115c28be55d3489c3a79c84db294b722a, 5c72decb78daa9e21cf0cc4d00c1fdfa70233719, 8a76993a673d694c17cd6fd6d7d9fc323fe224d4, 6a293f46d3eaafcbc4a3316f2ac80de9b1398415]
3.2-upstream-stable: ignored "Too much work to backport"
sid: released (4.5.1-1)
4.19-buster-security: N/A "Fixed before branching point"
diff --git a/active/CVE-2018-14610 b/active/CVE-2018-14610
index 7f67ab3c1..20e9ff557 100644
--- a/active/CVE-2018-14610
+++ b/active/CVE-2018-14610
@@ -9,7 +9,7 @@ Bugs:
upstream: released (4.19-rc1) [514c7dca85a0bf40be984dab0b477403a6db901f]
4.19-upstream-stable: N/A "Fixed before branch point"
4.9-upstream-stable: released (4.9.144) [7a72f918825ddece7a4ed79583836f6f1e06e478]
-3.16-upstream-stable: pending (3.16.83) [btrfs-check-that-each-block-group-has-corresponding-chunk-at-mount.patch]
+3.16-upstream-stable: released (3.16.83) [5203a4d55c2c6a0c86a0ab21bfd071d407ca95a1]
sid: released (4.19.9-1)
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.144-1)
diff --git a/active/CVE-2018-14611 b/active/CVE-2018-14611
index b39b7d1e1..cddb58024 100644
--- a/active/CVE-2018-14611
+++ b/active/CVE-2018-14611
@@ -9,7 +9,7 @@ Bugs:
upstream: released (4.19-rc1) [315409b0098fb2651d86553f0436b70502b29bb2]
4.19-upstream-stable: N/A "Fixed before branch point"
4.9-upstream-stable: released (4.9.144) [3c77b07dc365a7ed2644ca0dd38e6e40a9652d57]
-3.16-upstream-stable: pending (3.16.83) [btrfs-validate-type-when-reading-a-chunk.patch]
+3.16-upstream-stable: released (3.16.83) [cdfef40f9557b91384c392a9150bf0bb2b3802c7]
sid: released (4.19.9-1)
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.144-1)
diff --git a/active/CVE-2018-14612 b/active/CVE-2018-14612
index 1ce4b3a84..2571d0c5a 100644
--- a/active/CVE-2018-14612
+++ b/active/CVE-2018-14612
@@ -11,7 +11,7 @@ Bugs:
upstream: released (4.19-rc1) [ba480dd4db9f1798541eb2d1c423fc95feee8d36, 7ef49515fa6727cb4b6f2f5b0ffbc5fc20a9f8c6]
4.19-upstream-stable: N/A "Fixed before branch point"
4.9-upstream-stable: released (4.9.144) [6f33d3d8dca8683a4df94e9944296a1a1a2a6f10, 23eb2f435a07e1e09d48ea10c4a22bc96e16fde6]
-3.16-upstream-stable: pending (3.16.83) [btrfs-tree-checker-detect-invalid-and-empty-essential-trees.patch, btrfs-verify-that-every-chunk-has-corresponding-block-group-at-mount.patch]
+3.16-upstream-stable: released (3.16.83) [e3f6c37c31522cc99cea96e0f0f6f536026fb058, b84f82bdb43676854de8c5196bd8738805b892ee]
sid: released (4.18.8-1)
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.144-1)
diff --git a/active/CVE-2018-14613 b/active/CVE-2018-14613
index fc18b0f76..b17f9272c 100644
--- a/active/CVE-2018-14613
+++ b/active/CVE-2018-14613
@@ -7,7 +7,7 @@ Bugs:
upstream: released (4.19-rc1) [fce466eab7ac6baa9d2dcd88abcf945be3d4a089]
4.19-upstream-stable: N/A "Fixed before branch point"
4.9-upstream-stable: released (4.9.144) [058e388e42c8dc5b6ce6248990c75a0459e20197]
-3.16-upstream-stable: pending (3.16.83) [btrfs-tree-checker-verify-block_group_item.patch]
+3.16-upstream-stable: released (3.16.83) [df8ecef7a35de12986676edc45fd841e6d788ba8]
sid: released (4.19.9-1)
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.144-1)
diff --git a/active/CVE-2019-14896 b/active/CVE-2019-14896
index 649dbaa90..8f67178a1 100644
--- a/active/CVE-2019-14896
+++ b/active/CVE-2019-14896
@@ -10,7 +10,7 @@ Bugs:
upstream: released (5.5) [e5e884b42639c74b5b57dc277909915c0aefc8bb]
4.19-upstream-stable: released (4.19.100) cbd56515be5a8ea97134ef762b7a2923b94cb9c4]
4.9-upstream-stable: released (4.9.212) [b5e6f199de3b7f16b641c4ec5ac92906af1a9232]
-3.16-upstream-stable: pending (3.16.83) [libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch]
+3.16-upstream-stable: released (3.16.83) [e4646070f91312414af0ca9332a79b7153150fae]
sid: released (5.4.19-1)
4.19-buster-security: released (4.19.98-1) [bugfix/all/libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch]
4.9-stretch-security: released (4.9.210-1) [bugfix/all/libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch]
diff --git a/active/CVE-2019-14897 b/active/CVE-2019-14897
index e4d272b29..5456af053 100644
--- a/active/CVE-2019-14897
+++ b/active/CVE-2019-14897
@@ -11,7 +11,7 @@ Bugs:
upstream: released (5.5) [e5e884b42639c74b5b57dc277909915c0aefc8bb]
4.19-upstream-stable: released (4.19.100) cbd56515be5a8ea97134ef762b7a2923b94cb9c4]
4.9-upstream-stable: released (4.9.212) [e5e884b42639c74b5b57dc277909915c0aefc8bb]
-3.16-upstream-stable: pending (3.16.83) [libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch]
+3.16-upstream-stable: released (3.16.83) [e4646070f91312414af0ca9332a79b7153150fae]
sid: released (5.4.19-1)
4.19-buster-security: released (4.19.98-1) [bugfix/all/libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch]
4.9-stretch-security: released (4.9.210-1) [bugfix/all/libertas-fix-two-buffer-overflows-at-parsing-bss-descriptor.patch]
diff --git a/active/CVE-2019-14901 b/active/CVE-2019-14901
index d4365bda9..d7a4732dc 100644
--- a/active/CVE-2019-14901
+++ b/active/CVE-2019-14901
@@ -9,7 +9,7 @@ Bugs:
upstream: released (5.5-rc3) [1e58252e334dc3f3756f424a157d1b7484464c40]
4.19-upstream-stable: released (4.19.95) [21f08020dd8519baf209348c345131a8967e3cef]
4.9-upstream-stable: released (4.9.217) [cb87b895f1468df7a163a6c665bf106a4d26f8c1]
-3.16-upstream-stable: pending (3.16.83) [mwifiex-fix-heap-overflow-in-mmwifiex_process_tdls_action_frame.patch]
+3.16-upstream-stable: released (3.16.83) [ef0449fb4c94e52c1f5f7170b52a738acf9af5ff]
sid: released (5.4.13-1)
4.19-buster-security: released (4.19.98-1)
4.9-stretch-security: released (4.9.210-1) [bugfix/all/mwifiex-fix-heap-overflow-in-mmwifiex_process_tdls_a.patch]
diff --git a/active/CVE-2019-19768 b/active/CVE-2019-19768
index 94d3d86f7..e261859c9 100644
--- a/active/CVE-2019-19768
+++ b/active/CVE-2019-19768
@@ -8,7 +8,7 @@ Bugs:
upstream: released (5.6-rc4) [c780e86dd48ef6467a1146cf7d0fe1e05a635039]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
-3.16-upstream-stable: pending (3.16.83) [blktrace-protect-q-blk_trace-with-rcu.patch]
+3.16-upstream-stable: released (3.16.83) [4398bce1bdf258f7d67bcc38c46f5fa9546448bd]
sid: released (5.5.13-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-20636 b/active/CVE-2019-20636
index 0b44c5bfc..f2b0fe850 100644
--- a/active/CVE-2019-20636
+++ b/active/CVE-2019-20636
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.5-rc6) [cb222aed03d798fc074be55e59d9a112338ee784]
4.19-upstream-stable: released (4.19.96) [f5b9bfbe94a042a2e3806efa4c6e1b6ddb4292c4]
4.9-upstream-stable: released (4.9.210) [5f27f97dfed4aa29fb95b98bf5911763bd3ef038]
-3.16-upstream-stable: pending (3.16.83) [input-add-safety-guards-to-input_set_keycode.patch]
+3.16-upstream-stable: released (3.16.83) [4af47d3cc875e43a523f6d3b3edef2ca785ccf27]
sid: released (5.4.13-1)
4.19-buster-security: released (4.19.98-1)
4.9-stretch-security: released (4.9.210-1)
diff --git a/active/CVE-2019-5108 b/active/CVE-2019-5108
index 6de1dc5a2..3b0aeb1ff 100644
--- a/active/CVE-2019-5108
+++ b/active/CVE-2019-5108
@@ -9,7 +9,7 @@ Bugs:
upstream: released (5.3) [3e493173b7841259a08c5c8e5cbe90adb349da7e]
4.19-upstream-stable: released (4.19.97) [8f483142b0bb278f67eabccbe3d6a0e8c45284ad]
4.9-upstream-stable: released (4.9.211) [ca60f42d7965af9f22392caa4074ab0f58c7e1fe]
-3.16-upstream-stable: pending (3.16.83) [mac80211-do-not-send-layer-2-update-frame-before-authorization.patch]
+3.16-upstream-stable: released (3.16.83) [93864704f211e55eddec0c03ca300b1cf6414d8c]
sid: released (5.3.7-1)
4.19-buster-security: released (4.19.98-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2020-0009 b/active/CVE-2020-0009
index 679db214a..db0325982 100644
--- a/active/CVE-2020-0009
+++ b/active/CVE-2020-0009
@@ -7,7 +7,7 @@ Bugs:
upstream: released (5.6-rc3) [6d67b0290b4b84c477e6a2fc6e005e174d3c7786]
4.19-upstream-stable: released (4.19.107) [a4307700608e43dcf9b8abf1ee74f68227e9c61a]
4.9-upstream-stable: released (4.9.215) [a7fc5dbd17127c7301b0aefc2bcf1f54169c7383]
-3.16-upstream-stable: pending (3.16.83) [staging-android-ashmem-disallow-ashmem-memory-from-being-remapped.patch]
+3.16-upstream-stable: released (3.16.83) [85216b0a3fc5f3eb08e68750175f8507d5608e37]
sid: released (5.5.13-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-10690 b/active/CVE-2020-10690
index 3b34ed418..2aebf7b78 100644
--- a/active/CVE-2020-10690
+++ b/active/CVE-2020-10690
@@ -12,7 +12,7 @@ Bugs:
upstream: released (5.5-rc5) [a33121e5487b424339636b25c35d3a180eaa5f5e]
4.19-upstream-stable: released (4.19.93) [0393b8720128d5b39db8523e5bfbfc689f18c37c]
4.9-upstream-stable: needed
-3.16-upstream-stable: pending (3.16.83) [ptp-fix-the-race-between-the-release-of-ptp_clock-and-cdev.patch]
+3.16-upstream-stable: released (3.16.83) [5230ef61882d2d14deb846eb6b48370694816e4c]
sid: released (5.4.8-1)
4.19-buster-security: released (4.19.98-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2020-10942 b/active/CVE-2020-10942
index e0e01b193..2d3a86d9b 100644
--- a/active/CVE-2020-10942
+++ b/active/CVE-2020-10942
@@ -6,7 +6,7 @@ Bugs:
upstream: released (5.6-rc4) [42d84c8490f9f0931786f1623191fcab397c3d64]
4.19-upstream-stable: released (4.19.108) [ad598a48fe61c6c2407f08a807cb7a2ea83386b3]
4.9-upstream-stable: released (4.9.216) [7f574e92e4474f1b33425c4ee9ba48cd4fbe7d75]
-3.16-upstream-stable: pending (3.16.83) [vhost-check-docket-sk_family-instead-of-call-getname.patch]
+3.16-upstream-stable: released (3.16.83) [e4d98e5299b19e1caad03f0b38fd41b046d0de56]
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/all/vhost-Check-docket-sk_family-instead-of-call-getname.patch]
4.9-stretch-security: needed
diff --git a/active/CVE-2020-11494 b/active/CVE-2020-11494
index bed844a0a..d04b791f1 100644
--- a/active/CVE-2020-11494
+++ b/active/CVE-2020-11494
@@ -6,7 +6,7 @@ Bugs:
upstream: released (5.7-rc1) [b9258a2cece4ec1f020715fe3554bc2e360f6264]
4.19-upstream-stable: released (4.19.115) [b774578329afb238ccd504477731129aa15e9ec2]
4.9-upstream-stable: released (4.9.219) [925c631e84d77a72188101258878ac58a646d540]
-3.16-upstream-stable: pending (3.16.83) [slcan-don-t-transmit-uninitialized-stack-data-in-padding.patch]
+3.16-upstream-stable: released (3.16.83) [08fadc32ce6239dc75fd5e869590e29bc62bbc28]
sid: released (5.5.17-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-11565 b/active/CVE-2020-11565
index ec1457141..8cec8f11b 100644
--- a/active/CVE-2020-11565
+++ b/active/CVE-2020-11565
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.7-rc1) [aa9f7d5172fac9bf1f09e678c35e287a40a7b7dd]
4.19-upstream-stable: released (4.19.115) [fa138035f104ae14651ee3217d81fc16cd3aba4d]
4.9-upstream-stable: released (4.9.219) [c5544e72014cdb0a739f6971fb3dd4fb641b392c]
-3.16-upstream-stable: pending (3.16.83) [mm-mempolicy-require-at-least-one-nodeid-for-mpol_preferred.patch]
+3.16-upstream-stable: released (3.16.83) [7ca9aeb9a22b50841c401164703c5b0a4a510aff]
sid: released (5.5.17-1)
4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/all/mm-mempolicy-require-at-least-one-nodeid-for-MPOL_PR.patch]
4.9-stretch-security: needed
diff --git a/active/CVE-2020-11608 b/active/CVE-2020-11608
index 39394effc..a3ae2d2b1 100644
--- a/active/CVE-2020-11608
+++ b/active/CVE-2020-11608
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.7-rc1) [998912346c0da53a6dbb71fab3a138586b596b30]
4.19-upstream-stable: released (4.19.114) [747a7431661ab3c22ad1e721558bdf9e3d53d4a6]
4.9-upstream-stable: released (4.9.218) [03e73c3ef017580482d8e4de2db2bac9505facca]
-3.16-upstream-stable: pending (3.16.83) [media-ov519-add-missing-endpoint-sanity-checks.patch]
+3.16-upstream-stable: released (3.16.83) [39a4c51860e9695369b640962be4eb6984175384]
sid: released (5.5.17-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-11609 b/active/CVE-2020-11609
index 4af2c4962..2a57e305a 100644
--- a/active/CVE-2020-11609
+++ b/active/CVE-2020-11609
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.7-rc1) [485b06aadb933190f4bc44e006076bc27a23f205]
4.19-upstream-stable: released (4.19.114) [70764334b2bcb15c67dfbd912d9a9f7076f6d0df]
4.9-upstream-stable: released (4.9.218) [be6fdd999bcc66cbfde80efbdc16cfd8a3290e38]
-3.16-upstream-stable: pending (3.16.83) [media-stv06xx-add-missing-descriptor-sanity-checks.patch]
+3.16-upstream-stable: released (3.16.83) [98d33c0103b16e64a6a4788cf81e22baf229f48e]
sid: released (5.5.17-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-11668 b/active/CVE-2020-11668
index 7604bacb7..fea400bf2 100644
--- a/active/CVE-2020-11668
+++ b/active/CVE-2020-11668
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.7-rc1) [a246b4d547708f33ff4d4b9a7a5dbac741dc89d8]
4.19-upstream-stable: released (4.19.114) [5d064d7f0327d9425c5f63fa96efc70a74032d8b]
4.9-upstream-stable: released (4.9.218) [8f08a2bb2199a4511bea29e9a130b449f8c1a581]
-3.16-upstream-stable: pending (3.16.83) [media-xirlink_cit-add-missing-descriptor-sanity-checks.patch]
+3.16-upstream-stable: released (3.16.83) [9e236e2465ff5858bed537b94b15134e3ba55e75]
sid: released (5.5.17-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-1749 b/active/CVE-2020-1749
index 3f16a9d03..86c33aad0 100644
--- a/active/CVE-2020-1749
+++ b/active/CVE-2020-1749
@@ -10,7 +10,7 @@ Bugs:
upstream: released (5.5-rc1) [6c8991f41546c3c472503dff1ea9daaddf9331c2]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
-3.16-upstream-stable: pending (3.16.83) [net-ipv6_stub-use-ip6_dst_lookup_flow-instead-of-ip6_dst_lookup.patch]
+3.16-upstream-stable: released (3.16.83) [b9f3e457098ea76f2d69bfc369bae1fd0cf2a6e5]
sid: released (5.4.6-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-2732 b/active/CVE-2020-2732
index 397e820ca..df2e903ef 100644
--- a/active/CVE-2020-2732
+++ b/active/CVE-2020-2732
@@ -11,7 +11,7 @@ Bugs:
upstream: released (5.6-rc4) [07721feee46b4b248402133228235318199b05ec, 35a571346a94fb93b5b3b6a599675ef3384bc75c, e71237d3ff1abf9f3388337cfebf53b96df2020d]
4.19-upstream-stable: released (4.19.107) [ed9e97c35b454ceb1da4f65c318015a7ab298dae, 85dd0eb771e8cef7839dbd4cb61acde0b86ecd9e, e5c0857bd5ccf34d93b5b1ea858ab3d81a685b08]
4.9-upstream-stable: released (4.9.215) [86dc39e580d8e3ffa42c8157d3e28249fd9a12c5, f3e0dfb310e6a6f0190dbb3d6b337513b548507b, 35523a2d9918e36ad4fa6c9c0176279d7c1f4291]
-3.16-upstream-stable: pending (3.16.83) [kvm-nvmx-don-t-emulate-instructions-in-guest-mode.patch]
+3.16-upstream-stable: released (3.16.83) [5d7476c40cd352ec82aec26f6c6d8c413eb2b17b]
sid: released (5.5.13-1)
4.19-buster-security: released (4.19.98-1+deb10u1) [bugfix/x86/KVM-nVMX-Don-t-emulate-instructions-in-guest-mode.patch]
4.9-stretch-security: needed
diff --git a/active/CVE-2020-8647 b/active/CVE-2020-8647
index 2e0a8ea9c..945694314 100644
--- a/active/CVE-2020-8647
+++ b/active/CVE-2020-8647
@@ -6,7 +6,7 @@ Bugs:
upstream: released (5.6-rc5) [513dc792d6060d5ef572e43852683097a8420f56]
4.19-upstream-stable: released (4.19.109) [7abe1e0a874418b07524c9e07225df1cbb421ce9]
4.9-upstream-stable: released (4.9.216) 1f04adb4d691ed703b1fbc55d99f622b96cedecc]
-3.16-upstream-stable: pending (3.16.83) [vgacon-fix-a-uaf-in-vgacon_invert_region.patch]
+3.16-upstream-stable: released (3.16.83) [bca2e2e83484ff63ca82c9c2c905d4e580f1a35a]
sid: released (5.5.13-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-8648 b/active/CVE-2020-8648
index dc8a666c8..1b4c50020 100644
--- a/active/CVE-2020-8648
+++ b/active/CVE-2020-8648
@@ -7,7 +7,7 @@ Bugs:
upstream: released (5.6-rc3) [07e6124a1a46b4b5a9b3cacc0c306b50da87abf5, 4b70dd57a15d2f4685ac6e38056bad93e81e982f, 07e6124a1a46b4b5a9b3cacc0c306b50da87abf5]
4.19-upstream-stable: released (4.19.109) [31559b59040fc0e6ad363642112d4eb03ad4ebb7, efaef8463e1a9c20aa19c3de2b2d19f885e0315e, b4492f1e7456bd162714c0ec2815c2749d930844]
4.9-upstream-stable: released (4.9.216) [290a9381ccc16131c6ccc19940589141985db6b1, ccd35863147dd447110b726a0d4911ab686aade9, e5be0e24ffc7f5783a3864b5b958088ed15be9e8]
-3.16-upstream-stable: pending (3.16.83) [vt-selection-close-sel_buffer-race.patch, vt-selection-push-console-lock-down.patch, vt-selection-push-sel_lock-up.patch]
+3.16-upstream-stable: released (3.16.83) [a93c3b40fc3d2264b1b11c469319c7cbefb80c46, f443603c73b85db566373875ca8890ef0910f083, a93c3b40fc3d2264b1b11c469319c7cbefb80c46]
sid: released (5.5.13-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-8649 b/active/CVE-2020-8649
index cb18af786..3faa07d92 100644
--- a/active/CVE-2020-8649
+++ b/active/CVE-2020-8649
@@ -8,7 +8,7 @@ Bugs:
upstream: released (5.6-rc5) [513dc792d6060d5ef572e43852683097a8420f56]
4.19-upstream-stable: released (4.19.109) [7abe1e0a874418b07524c9e07225df1cbb421ce9]
4.9-upstream-stable: released (4.9.216) [1f04adb4d691ed703b1fbc55d99f622b96cedecc]
-3.16-upstream-stable: pending (3.16.83) [vgacon-fix-a-uaf-in-vgacon_invert_region.patch]
+3.16-upstream-stable: released (3.16.83) [bca2e2e83484ff63ca82c9c2c905d4e580f1a35a]
sid: released (5.5.13-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-9383 b/active/CVE-2020-9383
index 62f00ecd2..b3e0b5180 100644
--- a/active/CVE-2020-9383
+++ b/active/CVE-2020-9383
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.6-rc4) [2e90ca68b0d2f5548804f22f0dd61145516171e3]
4.19-upstream-stable: released (4.19.107) [c8fd87c53a1509162b910cec91c0c46753c58f9a]
4.9-upstream-stable: released (4.9.215) [5fbaa66c2a51c2260add842bd12cbc79715c5249]
-3.16-upstream-stable: pending (3.16.83) [floppy-check-fdc-index-for-errors-before-assigning-it.patch]
+3.16-upstream-stable: released (3.16.83) [2f9ac30a54dc0181ddac3705cdcf4775d863c530]
sid: released (5.5.13-1)
4.19-buster-security: needed
4.9-stretch-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy