From eec038484cae567fc5d43f9502072a555ac272cd Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Sat, 25 Sep 2021 10:04:04 +0200 Subject: Mark 5.10.46-5 as released --- active/CVE-2020-16119 | 2 +- active/CVE-2020-3702 | 2 +- active/CVE-2021-3653 | 2 +- active/CVE-2021-3656 | 2 +- active/CVE-2021-3679 | 2 +- active/CVE-2021-3732 | 2 +- active/CVE-2021-3739 | 2 +- active/CVE-2021-3743 | 2 +- active/CVE-2021-3753 | 2 +- active/CVE-2021-37576 | 2 +- active/CVE-2021-38160 | 2 +- active/CVE-2021-38166 | 2 +- active/CVE-2021-38199 | 2 +- active/CVE-2021-40490 | 2 +- active/CVE-2021-41073 | 2 +- 15 files changed, 15 insertions(+), 15 deletions(-) diff --git a/active/CVE-2020-16119 b/active/CVE-2020-16119 index d2f8b13d..d2fe2836 100644 --- a/active/CVE-2020-16119 +++ b/active/CVE-2020-16119 @@ -12,6 +12,6 @@ upstream: released (5.15-rc2) [d9ea761fdd197351890418acd462c51f241014a7] 4.19-upstream-stable: released (4.19.207) [dfec82f3e5b8bd93ab65b7417a64886ec8c42f14] 4.9-upstream-stable: released (4.9.283) [40ea36ffa7207456c3f155bbab76754d3f37ce04] sid: released (5.14.6-1) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch] -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/dccp-don-t-duplicate-ccid-when-cloning-dccp-sock.patch] 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-3702 b/active/CVE-2020-3702 index 0c61fc2f..1ec2003f 100644 --- a/active/CVE-2020-3702 +++ b/active/CVE-2020-3702 @@ -10,6 +10,6 @@ upstream: released (5.12-rc1) [56c5485c9e444c2e85e11694b6c44f1338fc20fd, 73488cb 4.19-upstream-stable: released (4.19.205) [dd5815f023b89c9a28325d8a2a5f0779b57b7190, d2fd9d34210f34cd0ff5b33fa94e9fcc2a513cea, fb924bfcecc90ca63ca76b5a10f192bd0e1bb35d, 7c5a966edd3c6eec4a9bdf698c1f27712d1781f0, 08c613a2cb06c68ef4e7733e052af067b21e5dbb] 4.9-upstream-stable: released (4.9.283) [ea3f7df20fc8e0b82ec0e065b0b0d38e55fd7775, 74adc24d162e67d8862edaf701de620f36f98215, d7d4c3c60342deba706fd76ef09d8af68b9a64d8, 13c51682b07a5db4d9efb514e700407c6da22ff9, 7afed8faf42d8358a165ba554891085e10b1f7a0] sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/ath-Use-safer-key-clearing-with-key-cache-entries.patch, bugfix/all/ath9k-Clear-key-cache-explicitly-on-disabling-hardwa.patch, bugfix/all/ath-Export-ath_hw_keysetmac.patch, bugfix/ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch, bugfix/all/ath9k-Postpone-key-cache-entry-deletion-for-TXQ-fram.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ath-Use-safer-key-clearing-with-key-cache-entries.patch, bugfix/all/ath9k-Clear-key-cache-explicitly-on-disabling-hardwa.patch, bugfix/all/ath-Export-ath_hw_keysetmac.patch, bugfix/ath-Modify-ath_key_delete-to-not-need-full-key-entry.patch, bugfix/all/ath9k-Postpone-key-cache-entry-deletion-for-TXQ-fram.patch] 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2021-3653 b/active/CVE-2021-3653 index 8d19b7ac..5a40dd98 100644 --- a/active/CVE-2021-3653 +++ b/active/CVE-2021-3653 @@ -8,6 +8,6 @@ upstream: released (5.14-rc7) [0f923e07124df069ba68d8bb12324398f4b6b709] 4.19-upstream-stable: released (4.19.205) [42f4312c0e8a225b5f1e3ed029509ef514f2157a] 4.9-upstream-stable: released (4.9.281) [29c4f674715ba8fe7a391473313e8c71f98799c4] sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/x86/KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/x86/KVM-nSVM-avoid-picking-up-unsupported-bits-from-L2-i.patch] 4.19-buster-security: needed 4.9-stretch-security: pending (4.9.282-1) diff --git a/active/CVE-2021-3656 b/active/CVE-2021-3656 index 5ea3f6f1..c02de2f2 100644 --- a/active/CVE-2021-3656 +++ b/active/CVE-2021-3656 @@ -10,6 +10,6 @@ upstream: released (5.14-rc7) [c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc] 4.19-upstream-stable: released (4.19.205) [119d547cbf7c055ba8100309ad71910478092f24] 4.9-upstream-stable: N/A "Vulnerable code not present" sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/x86/KVM-nSVM-always-intercept-VMLOAD-VMSAVE-when-nested-.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/x86/KVM-nSVM-always-intercept-VMLOAD-VMSAVE-when-nested-.patch] 4.19-buster-security: needed 4.9-stretch-security: N/A "Vulnerable code not present" diff --git a/active/CVE-2021-3679 b/active/CVE-2021-3679 index b012907e..16bd0aa2 100644 --- a/active/CVE-2021-3679 +++ b/active/CVE-2021-3679 @@ -8,6 +8,6 @@ upstream: released (5.14-rc3) [67f0d6d9883c13174669f88adac4f0ee656cc16a] 4.19-upstream-stable: released (4.19.199) [6a99bfee7f5625d2577a5c3b09a2bd2a845feb8a] 4.9-upstream-stable: released (4.9.277) [7db12bae1a239d872d17e128fd5271da789bf99c] sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/tracing-Fix-bug-in-rb_per_cpu_empty-that-might-cause.patch] 4.19-buster-security: needed 4.9-stretch-security: pending (4.9.282-1) diff --git a/active/CVE-2021-3732 b/active/CVE-2021-3732 index 528c40df..e273eb5d 100644 --- a/active/CVE-2021-3732 +++ b/active/CVE-2021-3732 @@ -8,6 +8,6 @@ upstream: released (5.14-rc6) [427215d85e8d1476da1a86b8d67aceb485eb3631] 4.19-upstream-stable: released (4.19.204) [963d85d630dabe75a3cfde44a006fec3304d07b8] 4.9-upstream-stable: released (4.9.280) [e3eee87c846dc47f6d8eb6d85e7271f24122a279] sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ovl-prevent-private-clone-if-bind-mount-is-not-allow.patch] 4.19-buster-security: needed 4.9-stretch-security: pending (4.9.282-1) diff --git a/active/CVE-2021-3739 b/active/CVE-2021-3739 index 192417a5..5d63ffae 100644 --- a/active/CVE-2021-3739 +++ b/active/CVE-2021-3739 @@ -14,6 +14,6 @@ upstream: released (5.15-rc1) [e4571b8c5e9ffa1e85c0c671995bd4dcc5c75091] 4.19-upstream-stable: N/A "Vulnerable code introduced later" 4.9-upstream-stable: N/A "Vulnerable code introduced later" sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/btrfs-fix-NULL-pointer-dereference-when-deleting-dev.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/btrfs-fix-NULL-pointer-dereference-when-deleting-dev.patch] 4.19-buster-security: N/A "Vulnerable code introduced later" 4.9-stretch-security: N/A "Vulnerable code introduced later" diff --git a/active/CVE-2021-3743 b/active/CVE-2021-3743 index 5a234c2b..8cd7e54e 100644 --- a/active/CVE-2021-3743 +++ b/active/CVE-2021-3743 @@ -9,6 +9,6 @@ upstream: released (5.14) [7e78c597c3ebfd0cb329aa09a838734147e4f117] 4.19-upstream-stable: released (4.19.206) [ce7d8be2eaa4cab3032e256d154d1c33843d2367] 4.9-upstream-stable: sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_post.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/net-qrtr-fix-another-OOB-Read-in-qrtr_endpoint_post.patch] 4.19-buster-security: needed 4.9-stretch-security: diff --git a/active/CVE-2021-3753 b/active/CVE-2021-3753 index 47d0b11b..3311ee87 100644 --- a/active/CVE-2021-3753 +++ b/active/CVE-2021-3753 @@ -8,6 +8,6 @@ upstream: released (5.15-rc1) [2287a51ba822384834dafc1c798453375d1107c7] 4.19-upstream-stable: released (4.19.206) [0776c1a20babb4ad0b7ce7f2f4e0806a97663187] 4.9-upstream-stable: released (4.9.282) [755a2f40dda2d6b2e3b8624cb052e68947ee4d1f] sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/vt_kdsetmode-extend-console-locking.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/vt_kdsetmode-extend-console-locking.patch] 4.19-buster-security: needed 4.9-stretch-security: pending (4.9.282-1) diff --git a/active/CVE-2021-37576 b/active/CVE-2021-37576 index 4da89fa2..22a0e9e6 100644 --- a/active/CVE-2021-37576 +++ b/active/CVE-2021-37576 @@ -9,6 +9,6 @@ upstream: released (5.14-rc3) [f62f3c20647ebd5fb6ecb8f0b477b9281c44c10a] 4.19-upstream-stable: released (4.19.199) [0493b10c06021796ba80cbe53c961defd5aca6e5] 4.9-upstream-stable: released (4.9.277) [8c46b4b2749c4b3b7e602403addc32ec2b48baed] sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/powerpc/KVM-PPC-Book3S-Fix-H_RTAS-rets-buffer-overflow.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/powerpc/KVM-PPC-Book3S-Fix-H_RTAS-rets-buffer-overflow.patch] 4.19-buster-security: needed 4.9-stretch-security: ignored "powerpc not supported in LTS" diff --git a/active/CVE-2021-38160 b/active/CVE-2021-38160 index af5d09a5..349917e2 100644 --- a/active/CVE-2021-38160 +++ b/active/CVE-2021-38160 @@ -7,6 +7,6 @@ upstream: released (5.14-rc1) [d00d8da5869a2608e97cfede094dfc5e11462a46] 4.19-upstream-stable: released (4.19.198) [b5fba782ccd3d12a14f884cd20f255fc9c0eec0c] 4.9-upstream-stable: released (4.9.276) [9e2b8368b2079437c6840f3303cb0b7bc9b896ee] sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/virtio_console-Assure-used-length-from-device-is-lim.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/virtio_console-Assure-used-length-from-device-is-lim.patch] 4.19-buster-security: needed 4.9-stretch-security: pending (4.9.282-1) diff --git a/active/CVE-2021-38166 b/active/CVE-2021-38166 index 0ceacbc9..6fea1d37 100644 --- a/active/CVE-2021-38166 +++ b/active/CVE-2021-38166 @@ -11,6 +11,6 @@ upstream: released (5.14-rc6) [c4eb1f403243fc7bbb7de644db8587c03de36da6] 4.19-upstream-stable: N/A "Vulnerable code introduced later" 4.9-upstream-stable: N/A "Vulnerable code introduced later" sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/bpf-Fix-integer-overflow-involving-bucket_size.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/bpf-Fix-integer-overflow-involving-bucket_size.patch] 4.19-buster-security: N/A "Vulnerable code introduced later" 4.9-stretch-security: N/A "Vulnerable code introduced later" diff --git a/active/CVE-2021-38199 b/active/CVE-2021-38199 index c02dbc8c..d818d7d7 100644 --- a/active/CVE-2021-38199 +++ b/active/CVE-2021-38199 @@ -7,6 +7,6 @@ upstream: released (5.14-rc1) [dd99e9f98fbf423ff6d365b37a98e8879170f17c] 4.19-upstream-stable: released (4.19.198) [743f6b973c8ba8a0a5ed15ab11e1d07fa00d5368] 4.9-upstream-stable: sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/NFSv4-Initialise-connection-to-the-server-in-nfs4_al.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/NFSv4-Initialise-connection-to-the-server-in-nfs4_al.patch] 4.19-buster-security: needed 4.9-stretch-security: diff --git a/active/CVE-2021-40490 b/active/CVE-2021-40490 index fb67bb51..83f757ba 100644 --- a/active/CVE-2021-40490 +++ b/active/CVE-2021-40490 @@ -9,6 +9,6 @@ upstream: released (5.15-rc1) [a54c4613dac1500b40e4ab55199f7c51f028e848] 4.19-upstream-stable: released (4.19.207) [c481607ba522e31e6ed01efefc19cc1d0e0a46fa] 4.9-upstream-stable: released (4.9.283) [7067b09fe587cbd47544a3047a40c64e4d636fff] sid: released (5.14.6-1) -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/ext4-fix-race-writing-to-an-inline_data-file-while-i.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/ext4-fix-race-writing-to-an-inline_data-file-while-i.patch] 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2021-41073 b/active/CVE-2021-41073 index 08d3b827..2bfa8d69 100644 --- a/active/CVE-2021-41073 +++ b/active/CVE-2021-41073 @@ -9,6 +9,6 @@ upstream: released (5.15-rc2) [16c8d2df7ec0eed31b7d3b61cb13206a7fb930cc] 4.19-upstream-stable: N/A "Vulnerable code introduced later" 4.9-upstream-stable: N/A "Vulnerable code introduced later" sid: released (5.14.6-2) [bugfix/all/io_uring-ensure-symmetry-in-handling-iter-types-in-l.patch] -5.10-bullseye-security: pending (5.10.46-5) [bugfix/all/io_uring-ensure-symmetry-in-handling-iter-types-in-l.patch] +5.10-bullseye-security: released (5.10.46-5) [bugfix/all/io_uring-ensure-symmetry-in-handling-iter-types-in-l.patch] 4.19-buster-security: N/A "Vulnerable code introduced later" 4.9-stretch-security: N/A "Vulnerable code introduced later" -- cgit v1.2.3