summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-09-25 10:04:04 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2021-09-25 10:04:04 +0200
commiteec038484cae567fc5d43f9502072a555ac272cd (patch)
treed23f57266f0ba47d7f6ae45da249522cd97dc152
parenta9706e962747b0e40138197a67c54e376d35ed4f (diff)
Mark 5.10.46-5 as released
-rw-r--r--active/CVE-2020-161192
-rw-r--r--active/CVE-2020-37022
-rw-r--r--active/CVE-2021-36532
-rw-r--r--active/CVE-2021-36562
-rw-r--r--active/CVE-2021-36792
-rw-r--r--active/CVE-2021-37322
-rw-r--r--active/CVE-2021-37392
-rw-r--r--active/CVE-2021-37432
-rw-r--r--active/CVE-2021-37532
-rw-r--r--active/CVE-2021-375762
-rw-r--r--active/CVE-2021-381602
-rw-r--r--active/CVE-2021-381662
-rw-r--r--active/CVE-2021-381992
-rw-r--r--active/CVE-2021-404902
-rw-r--r--active/CVE-2021-410732
15 files changed, 15 insertions, 15 deletions
diff --git a/active/CVE-2020-16119 b/active/CVE-2020-16119
index d2f8b13d..d2fe2836 100644
--- a/active/CVE-2020-16119
+++ b/active/CVE-2020-16119
@@ -12,6 +12,6 @@ upstream: released (5.15-rc2) [d9ea761fdd197351890418acd462c51f241014a7]
4.19-upstream-stable: released (4.19.207) [dfec82f3e5b8bd93ab65b7417a64886ec8c42f14]
4.9-upstream-stable: released (4.9.283) [40ea36ffa7207456c3f155bbab76754d3f37ce04]
sid: released (5.14.6-1) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch]
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch]
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-3702 b/active/CVE-2020-3702
index 0c61fc2f..1ec2003f 100644
--- a/active/CVE-2020-3702
+++ b/active/CVE-2020-3702
@@ -10,6 +10,6 @@ upstream: released (5.12-rc1) [56c5485c9e444c2e85e11694b6c44f1338fc20fd, 73488cb
4.19-upstream-stable: released (4.19.205) [dd5815f023b89c9a28325d8a2a5f0779b57b7190, d2fd9d34210f34cd0ff5b33fa94e9fcc2a513cea, fb924bfcecc90ca63ca76b5a10f192bd0e1bb35d, 7c5a966edd3c6eec4a9bdf698c1f27712d1781f0, 08c613a2cb06c68ef4e7733e052af067b21e5dbb]
4.9-upstream-stable: released (4.9.283) [ea3f7df20fc8e0b82ec0e065b0b0d38e55fd7775, 74adc24d162e67d8862edaf701de620f36f98215, d7d4c3c60342deba706fd76ef09d8af68b9a64d8, 13c51682b07a5db4d9efb514e700407c6da22ff9, 7afed8faf42d8358a165ba554891085e10b1f7a0]
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/ath-Use-safer-key-clearing-with-key-cache-entries.patch, bugfix/all/ath9k-Clear-key-cache-explicitly-on-disabling-hardwa.patch, bugfix/all/ath-Export-ath_hw_keysetmac.patch, bugfix/ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch, bugfix/all/ath9k-Postpone-key-cache-entry-deletion-for-TXQ-fram.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ath-Use-safer-key-clearing-with-key-cache-entries.patch, bugfix/all/ath9k-Clear-key-cache-explicitly-on-disabling-hardwa.patch, bugfix/all/ath-Export-ath_hw_keysetmac.patch, bugfix/ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch, bugfix/all/ath9k-Postpone-key-cache-entry-deletion-for-TXQ-fram.patch]
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2021-3653 b/active/CVE-2021-3653
index 8d19b7ac..5a40dd98 100644
--- a/active/CVE-2021-3653
+++ b/active/CVE-2021-3653
@@ -8,6 +8,6 @@ upstream: released (5.14-rc7) [0f923e07124df069ba68d8bb12324398f4b6b709]
4.19-upstream-stable: released (4.19.205) [42f4312c0e8a225b5f1e3ed029509ef514f2157a]
4.9-upstream-stable: released (4.9.281) [29c4f674715ba8fe7a391473313e8c71f98799c4]
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/x86/KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/x86/KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch]
4.19-buster-security: needed
4.9-stretch-security: pending (4.9.282-1)
diff --git a/active/CVE-2021-3656 b/active/CVE-2021-3656
index 5ea3f6f1..c02de2f2 100644
--- a/active/CVE-2021-3656
+++ b/active/CVE-2021-3656
@@ -10,6 +10,6 @@ upstream: released (5.14-rc7) [c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc]
4.19-upstream-stable: released (4.19.205) [119d547cbf7c055ba8100309ad71910478092f24]
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/x86/KVM-nSVM-always-intercept-VMLOAD-VMSAVE-when-nested-.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/x86/KVM-nSVM-always-intercept-VMLOAD-VMSAVE-when-nested-.patch]
4.19-buster-security: needed
4.9-stretch-security: N/A "Vulnerable code not present"
diff --git a/active/CVE-2021-3679 b/active/CVE-2021-3679
index b012907e..16bd0aa2 100644
--- a/active/CVE-2021-3679
+++ b/active/CVE-2021-3679
@@ -8,6 +8,6 @@ upstream: released (5.14-rc3) [67f0d6d9883c13174669f88adac4f0ee656cc16a]
4.19-upstream-stable: released (4.19.199) [6a99bfee7f5625d2577a5c3b09a2bd2a845feb8a]
4.9-upstream-stable: released (4.9.277) [7db12bae1a239d872d17e128fd5271da789bf99c]
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch]
4.19-buster-security: needed
4.9-stretch-security: pending (4.9.282-1)
diff --git a/active/CVE-2021-3732 b/active/CVE-2021-3732
index 528c40df..e273eb5d 100644
--- a/active/CVE-2021-3732
+++ b/active/CVE-2021-3732
@@ -8,6 +8,6 @@ upstream: released (5.14-rc6) [427215d85e8d1476da1a86b8d67aceb485eb3631]
4.19-upstream-stable: released (4.19.204) [963d85d630dabe75a3cfde44a006fec3304d07b8]
4.9-upstream-stable: released (4.9.280) [e3eee87c846dc47f6d8eb6d85e7271f24122a279]
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch]
4.19-buster-security: needed
4.9-stretch-security: pending (4.9.282-1)
diff --git a/active/CVE-2021-3739 b/active/CVE-2021-3739
index 192417a5..5d63ffae 100644
--- a/active/CVE-2021-3739
+++ b/active/CVE-2021-3739
@@ -14,6 +14,6 @@ upstream: released (5.15-rc1) [e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091]
4.19-upstream-stable: N/A "Vulnerable code introduced later"
4.9-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/btrfs-fix-NULL-pointer-dereference-when-deleting-dev.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/btrfs-fix-NULL-pointer-dereference-when-deleting-dev.patch]
4.19-buster-security: N/A "Vulnerable code introduced later"
4.9-stretch-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2021-3743 b/active/CVE-2021-3743
index 5a234c2b..8cd7e54e 100644
--- a/active/CVE-2021-3743
+++ b/active/CVE-2021-3743
@@ -9,6 +9,6 @@ upstream: released (5.14) [7e78c597c3ebfd0cb329aa09a838734147e4f117]
4.19-upstream-stable: released (4.19.206) [ce7d8be2eaa4cab3032e256d154d1c33843d2367]
4.9-upstream-stable:
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_post.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_post.patch]
4.19-buster-security: needed
4.9-stretch-security:
diff --git a/active/CVE-2021-3753 b/active/CVE-2021-3753
index 47d0b11b..3311ee87 100644
--- a/active/CVE-2021-3753
+++ b/active/CVE-2021-3753
@@ -8,6 +8,6 @@ upstream: released (5.15-rc1) [2287a51ba822384834dafc1c798453375d1107c7]
4.19-upstream-stable: released (4.19.206) [0776c1a20babb4ad0b7ce7f2f4e0806a97663187]
4.9-upstream-stable: released (4.9.282) [755a2f40dda2d6b2e3b8624cb052e68947ee4d1f]
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/vt_kdsetmode-extend-console-locking.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/vt_kdsetmode-extend-console-locking.patch]
4.19-buster-security: needed
4.9-stretch-security: pending (4.9.282-1)
diff --git a/active/CVE-2021-37576 b/active/CVE-2021-37576
index 4da89fa2..22a0e9e6 100644
--- a/active/CVE-2021-37576
+++ b/active/CVE-2021-37576
@@ -9,6 +9,6 @@ upstream: released (5.14-rc3) [f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a]
4.19-upstream-stable: released (4.19.199) [0493b10c06021796ba80cbe53c961defd5aca6e5]
4.9-upstream-stable: released (4.9.277) [8c46b4b2749c4b3b7e602403addc32ec2b48baed]
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/powerpc/KVM-PPC-Book3S-Fix-H_RTAS-rets-buffer-overflow.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/powerpc/KVM-PPC-Book3S-Fix-H_RTAS-rets-buffer-overflow.patch]
4.19-buster-security: needed
4.9-stretch-security: ignored "powerpc not supported in LTS"
diff --git a/active/CVE-2021-38160 b/active/CVE-2021-38160
index af5d09a5..349917e2 100644
--- a/active/CVE-2021-38160
+++ b/active/CVE-2021-38160
@@ -7,6 +7,6 @@ upstream: released (5.14-rc1) [d00d8da5869a2608e97cfede094dfc5e11462a46]
4.19-upstream-stable: released (4.19.198) [b5fba782ccd3d12a14f884cd20f255fc9c0eec0c]
4.9-upstream-stable: released (4.9.276) [9e2b8368b2079437c6840f3303cb0b7bc9b896ee]
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/virtio_console-Assure-used-length-from-device-is-lim.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/virtio_console-Assure-used-length-from-device-is-lim.patch]
4.19-buster-security: needed
4.9-stretch-security: pending (4.9.282-1)
diff --git a/active/CVE-2021-38166 b/active/CVE-2021-38166
index 0ceacbc9..6fea1d37 100644
--- a/active/CVE-2021-38166
+++ b/active/CVE-2021-38166
@@ -11,6 +11,6 @@ upstream: released (5.14-rc6) [c4eb1f403243fc7bbb7de644db8587c03de36da6]
4.19-upstream-stable: N/A "Vulnerable code introduced later"
4.9-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/bpf-Fix-integer-overflow-involving-bucket_size.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/bpf-Fix-integer-overflow-involving-bucket_size.patch]
4.19-buster-security: N/A "Vulnerable code introduced later"
4.9-stretch-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2021-38199 b/active/CVE-2021-38199
index c02dbc8c..d818d7d7 100644
--- a/active/CVE-2021-38199
+++ b/active/CVE-2021-38199
@@ -7,6 +7,6 @@ upstream: released (5.14-rc1) [dd99e9f98fbf423ff6d365b37a98e8879170f17c]
4.19-upstream-stable: released (4.19.198) [743f6b973c8ba8a0a5ed15ab11e1d07fa00d5368]
4.9-upstream-stable:
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/NFSv4-Initialise-connection-to-the-server-in-nfs4_al.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/NFSv4-Initialise-connection-to-the-server-in-nfs4_al.patch]
4.19-buster-security: needed
4.9-stretch-security:
diff --git a/active/CVE-2021-40490 b/active/CVE-2021-40490
index fb67bb51..83f757ba 100644
--- a/active/CVE-2021-40490
+++ b/active/CVE-2021-40490
@@ -9,6 +9,6 @@ upstream: released (5.15-rc1) [a54c4613dac1500b40e4ab55199f7c51f028e848]
4.19-upstream-stable: released (4.19.207) [c481607ba522e31e6ed01efefc19cc1d0e0a46fa]
4.9-upstream-stable: released (4.9.283) [7067b09fe587cbd47544a3047a40c64e4d636fff]
sid: released (5.14.6-1)
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/ext4-fix-race-writing-to-an-inline_data-file-while-i.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ext4-fix-race-writing-to-an-inline_data-file-while-i.patch]
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2021-41073 b/active/CVE-2021-41073
index 08d3b827..2bfa8d69 100644
--- a/active/CVE-2021-41073
+++ b/active/CVE-2021-41073
@@ -9,6 +9,6 @@ upstream: released (5.15-rc2) [16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc]
4.19-upstream-stable: N/A "Vulnerable code introduced later"
4.9-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.14.6-2) [bugfix/all/io_uring-ensure-symmetry-in-handling-iter-types-in-l.patch]
-5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/io_uring-ensure-symmetry-in-handling-iter-types-in-l.patch]
+5.10-bullseye-security: released (5.10.46-5) [bugfix/all/io_uring-ensure-symmetry-in-handling-iter-types-in-l.patch]
4.19-buster-security: N/A "Vulnerable code introduced later"
4.9-stretch-security: N/A "Vulnerable code introduced later"

© 2014-2024 Faster IT GmbH | imprint | privacy policy