summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2019-11-15 01:03:45 +0000
committerBen Hutchings <ben@decadent.org.uk>2019-11-15 01:03:45 +0000
commit278ed38316e659c174adb6fb5ae2f234258f1de9 (patch)
treed9391ed1f17353a861ed449b7b4cbab9b949d1c1
parent2e2c3b03d835a618712701cad7773df1f66aaf1a (diff)
Mark issues released in 3.16.77
-rw-r--r--active/CVE-2019-01542
-rw-r--r--active/CVE-2019-111352
-rw-r--r--active/CVE-2019-150982
-rw-r--r--active/CVE-2019-152172
-rw-r--r--active/CVE-2019-155052
-rw-r--r--active/CVE-2019-170522
-rw-r--r--active/CVE-2019-170532
-rw-r--r--active/CVE-2019-170542
-rw-r--r--active/CVE-2019-170552
-rw-r--r--active/CVE-2019-170562
-rw-r--r--active/CVE-2019-171332
-rw-r--r--active/CVE-2019-176662
12 files changed, 12 insertions, 12 deletions
diff --git a/active/CVE-2019-0154 b/active/CVE-2019-0154
index 4fa1eff5b..908116874 100644
--- a/active/CVE-2019-0154
+++ b/active/CVE-2019-0154
@@ -8,7 +8,7 @@ Bugs:
upstream: pending (5.4) [1d85a299c4db57c55e0229615132c964d17aa765, 7e34f4e4aad3fd34c02b294a3cf2321adf5b4438]
4.19-upstream-stable: released (4.19.84) [011b7173cbdbd1a5f1826656693ea51516f15dc1, 255ed51599dea571ac15afc676b2705cf2f83975]
4.9-upstream-stable: released (4.9.201) [ebd6ded190ed0920c16eb63f274b50ca050e46fb, 00194ecfb32cab5bc20ce1308c681c47094015bd]
-3.16-upstream-stable: pending (3.16.77) [drm-i915-gen8-add-rc6-ctx-corruption-wa.patch]
+3.16-upstream-stable: released (3.16.77) [drm-i915-gen8-add-rc6-ctx-corruption-wa.patch]
sid: released (5.3.9-2) [bugfix/x86/i915/0011-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs.patch, bugfix/x86/i915/0012-drm-i915-gen8-Add-RC6-CTX-corruption-WA.patch]
4.19-buster-security: released (4.19.67-2+deb10u2) [bugfix/x86/i915/0011-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs.patch, bugfix/x86/i915/0012-drm-i915-gen8-Add-RC6-CTX-corruption-WA.patch]
4.9-stretch-security: released (4.9.189-3+deb9u2) [bugfix/x86/i915/0011-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs.patch, bugfix/x86/i915/0012-drm-i915-gen8-Add-RC6-CTX-corruption-WA.patch]
diff --git a/active/CVE-2019-11135 b/active/CVE-2019-11135
index 262b9a12d..0504e9b8d 100644
--- a/active/CVE-2019-11135
+++ b/active/CVE-2019-11135
@@ -12,7 +12,7 @@ Bugs:
upstream: pending (5.4) [c2955f270a84762343000f103e0640d29c7a96f3, 286836a70433fb64131d2590f4bf512097c255e1, 95c5824f75f3ba4c9e8e5a4b1a623c95390ac266, 1b42f017415b46c317e71d41c34ec088417a1883, 6608b45ac5ecb56f9e171252229c39580cc85f0f, e1d38b63acd843cfdd4222bf19a26700fd5c699e, 7531a3596e3272d1f6841e0d601a614555dc6b65, a7a248c593e4fd7a67c50b5f5318fe42a0db335e, db616173d787395787ecc93eef075fa975227b10, 012206a822a8b6ac09125bfaa210a95b9eb8f1c1]
4.19-upstream-stable: released (4.19.84) [4002d16a2ae1e3bdc0aa36ce5089bd62b4b9eab6, 37cf9ef900ccb3183c84b2181291b23927cf8002, b8eb348ae40878a5a0a4de444fa5d2ea8a539f6c, 6c58ea8525bf6df7f4df2692784d2ce315201895, 15dfa5d706df85506a527c5572be5ff322031a01, a0808f06dfa1adca8e81716cf773db8c8f1c07b9, 2402432d55576a2c35546c72d19893a21edbf133, e3bf6b3ff55a549cef225bb25724aa7858377c15, 4ad7466ddf2d78ad2e3f700ed69b694b9f232896, 415bb221a07038f7a54c4187f1aef1e8e2a4925f]
4.9-upstream-stable: needed
-3.16-upstream-stable: pending (3.16.77) [x86-msr-add-the-ia32_tsx_ctrl-msr.patch, x86-cpu-add-a-helper-function-x86_read_arch_cap_msr.patch, x86-cpu-add-a-tsx-cmdline-option-with-tsx-disabled-by-default.patch, x86-speculation-taa-add-mitigation-for-tsx-async-abort.patch, x86-speculation-taa-add-sysfs-reporting-for-tsx-async-abort.patch, kvm-x86-export-mds_no-0-to-guests-when-tsx-is-enabled.patch, x86-tsx-add-auto-option-to-the-tsx-cmdline-parameter.patch, x86-speculation-taa-add-documentation-for-tsx-async-abort.patch, x86-tsx-add-config-options-to-set-tsx-on-off-auto.patch, x86-speculation-taa-fix-printing-of-taa_msg_smt-on-ibrs_all-cpus.patch]
+3.16-upstream-stable: released (3.16.77) [x86-msr-add-the-ia32_tsx_ctrl-msr.patch, x86-cpu-add-a-helper-function-x86_read_arch_cap_msr.patch, x86-cpu-add-a-tsx-cmdline-option-with-tsx-disabled-by-default.patch, x86-speculation-taa-add-mitigation-for-tsx-async-abort.patch, x86-speculation-taa-add-sysfs-reporting-for-tsx-async-abort.patch, kvm-x86-export-mds_no-0-to-guests-when-tsx-is-enabled.patch, x86-tsx-add-auto-option-to-the-tsx-cmdline-parameter.patch, x86-speculation-taa-add-documentation-for-tsx-async-abort.patch, x86-tsx-add-config-options-to-set-tsx-on-off-auto.patch, x86-speculation-taa-fix-printing-of-taa_msg_smt-on-ibrs_all-cpus.patch]
sid: released (5.3.9-2) [bugfix/x86/taa/0001-x86-msr-Add-the-IA32_TSX_CTRL-MSR.patch, bugfix/x86/taa/0002-x86-cpu-Add-a-helper-function-x86_read_arch_cap_msr.patch, bugfix/x86/taa/0003-x86-cpu-Add-a-tsx-cmdline-option-with-TSX-disabled-b.patch, bugfix/x86/taa/0004-x86-speculation-taa-Add-mitigation-for-TSX-Async-Abo.patch, bugfix/x86/taa/0005-x86-speculation-taa-Add-sysfs-reporting-for-TSX-Asyn.patch, bugfix/x86/taa/0006-kvm-x86-Export-MDS_NO-0-to-guests-when-TSX-is-enable.patch, bugfix/x86/taa/0007-x86-tsx-Add-auto-option-to-the-tsx-cmdline-parameter.patch, bugfix/x86/taa/0008-x86-speculation-taa-Add-documentation-for-TSX-Async-.patch, bugfix/x86/taa/0009-x86-tsx-Add-config-options-to-set-tsx-on-off-auto.patch, bugfix/x86/taa/0010-x86-speculation-taa-Fix-printing-of-TAA_MSG_SMT-on-I.patch]
4.19-buster-security: released (4.19.67-2+deb10u2) [bugfix/x86/taa/0001-KVM-x86-use-Intel-speculation-bugs-and-features-as-d.patch, bugfix/x86/taa/0002-x86-msr-Add-the-IA32_TSX_CTRL-MSR.patch, bugfix/x86/taa/0003-x86-cpu-Add-a-helper-function-x86_read_arch_cap_msr.patch, bugfix/x86/taa/0004-x86-cpu-Add-a-tsx-cmdline-option-with-TSX-disabled-b.patch, bugfix/x86/taa/0005-x86-speculation-taa-Add-mitigation-for-TSX-Async-Abo.patch, bugfix/x86/taa/0006-x86-speculation-taa-Add-sysfs-reporting-for-TSX-Asyn.patch, bugfix/x86/taa/0007-kvm-x86-Export-MDS_NO-0-to-guests-when-TSX-is-enable.patch, bugfix/x86/taa/0008-x86-tsx-Add-auto-option-to-the-tsx-cmdline-parameter.patch, bugfix/x86/taa/0009-x86-speculation-taa-Add-documentation-for-TSX-Async-.patch, bugfix/x86/taa/0010-x86-tsx-Add-config-options-to-set-tsx-on-off-auto.patch, bugfix/x86/taa/0015-x86-speculation-taa-Fix-printing-of-TAA_MSG_SMT-on-I.patch]
4.9-stretch-security: released (4.9.189-3+deb9u2) [bugfix/x86/taa/0001-KVM-x86-use-Intel-speculation-bugs-and-features-as-d.patch, bugfix/x86/taa/0002-x86-msr-Add-the-IA32_TSX_CTRL-MSR.patch, bugfix/x86/taa/0003-x86-cpu-Add-a-helper-function-x86_read_arch_cap_msr.patch, bugfix/x86/taa/0004-x86-cpu-Add-a-tsx-cmdline-option-with-TSX-disabled-b.patch, bugfix/x86/taa/0005-x86-speculation-taa-Add-mitigation-for-TSX-Async-Abo.patch, bugfix/x86/taa/0006-x86-speculation-taa-Add-sysfs-reporting-for-TSX-Asyn.patch, bugfix/x86/taa/0007-kvm-x86-Export-MDS_NO-0-to-guests-when-TSX-is-enable.patch, bugfix/x86/taa/0008-x86-tsx-Add-auto-option-to-the-tsx-cmdline-parameter.patch, bugfix/x86/taa/0009-x86-speculation-taa-Add-documentation-for-TSX-Async-.patch, bugfix/x86/taa/0010-x86-tsx-Add-config-options-to-set-tsx-on-off-auto.patch, bugfix/x86/taa/0011-x86-speculation-taa-Fix-printing-of-TAA_MSG_SMT-on-I.patch]
diff --git a/active/CVE-2019-15098 b/active/CVE-2019-15098
index 9e4607ff9..014b5a109 100644
--- a/active/CVE-2019-15098
+++ b/active/CVE-2019-15098
@@ -9,7 +9,7 @@ Bugs:
upstream: released (5.4-rc1) [39d170b3cb62ba98567f5c4f40c27b5864b304e5]
4.19-upstream-stable: released (4.19.82) [696da02259463ea634821e117088f82afe7bf851]
4.9-upstream-stable: released (4.9.199) [3c7f02d13b8d72dbb1dd9b0fe858459d263b1fbd]
-3.16-upstream-stable: pending (3.16.77) [ath6kl-fix-a-null-ptr-deref-bug-in-ath6kl_usb_alloc_urb_from_pipe.patch]
+3.16-upstream-stable: released (3.16.77) [ath6kl-fix-a-null-ptr-deref-bug-in-ath6kl_usb_alloc_urb_from_pipe.patch]
sid: released (5.3.7-1) [bugfix/all/ath6kl-fix-a-NULL-ptr-deref-bug-in-ath6kl_usb_alloc_.patch]
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-15217 b/active/CVE-2019-15217
index 6589a008b..cefc03294 100644
--- a/active/CVE-2019-15217
+++ b/active/CVE-2019-15217
@@ -8,7 +8,7 @@ Bugs:
upstream: released (5.3-rc1) [5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
-3.16-upstream-stable: pending (3.16.77) [media-usb-zr364xx-fix-kasan-null-ptr-deref-read-in.patch]
+3.16-upstream-stable: released (3.16.77) [media-usb-zr364xx-fix-kasan-null-ptr-deref-read-in.patch]
sid: released (5.2.6-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-15505 b/active/CVE-2019-15505
index a4c471058..e3d8c6dbb 100644
--- a/active/CVE-2019-15505
+++ b/active/CVE-2019-15505
@@ -9,7 +9,7 @@ Bugs:
upstream: released (5.4-rc1) [0c4df39e504bf925ab666132ac3c98d6cbbe380b]
4.19-upstream-stable: released (4.19.75) [b841a9f58d9c778d8c2c5f636dc06a53b9a47fa1]
4.9-upstream-stable: released (4.9.194) [994c6dcb4307759d440b8031e140d343b8611481]
-3.16-upstream-stable: pending (3.16.77) [media-technisat-usb2-break-out-of-loop-at-end-of-buffer.patch]
+3.16-upstream-stable: released (3.16.77) [media-technisat-usb2-break-out-of-loop-at-end-of-buffer.patch]
sid: released (5.2.17-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17052 b/active/CVE-2019-17052
index 653256bf3..e76340b2d 100644
--- a/active/CVE-2019-17052
+++ b/active/CVE-2019-17052
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.4-rc1) [0614e2b73768b502fc32a75349823356d98aae2c]
4.19-upstream-stable: released (4.19.77) [6f0f18e532693ecc1e0c7938e0d63531ea62bc3e]
4.9-upstream-stable: released (4.9.195) [73b8d26c842a5a3be34a321beab1f97939d9794b]
-3.16-upstream-stable: pending (3.16.77) [ax25-enforce-cap_net_raw-for-raw-sockets.patch]
+3.16-upstream-stable: released (3.16.77) [ax25-enforce-cap_net_raw-for-raw-sockets.patch]
sid: released (5.3.7-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17053 b/active/CVE-2019-17053
index a2a49ce76..6b93dbcfd 100644
--- a/active/CVE-2019-17053
+++ b/active/CVE-2019-17053
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.4-rc1) [e69dbd4619e7674c1679cba49afd9dd9ac347eef]
4.19-upstream-stable: released (4.19.77) [dd651ab7a11436f787aed0a987c85864b261ff19]
4.9-upstream-stable: released (4.9.195) [ddca1f39c8980cb19db5ea6d51b8549288a7421b]
-3.16-upstream-stable: pending (3.16.77) [ieee802154-enforce-cap_net_raw-for-raw-sockets.patch]
+3.16-upstream-stable: released (3.16.77) [ieee802154-enforce-cap_net_raw-for-raw-sockets.patch]
sid: released (5.3.7-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17054 b/active/CVE-2019-17054
index 751c43b2b..f92937857 100644
--- a/active/CVE-2019-17054
+++ b/active/CVE-2019-17054
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.4-rc1) [6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac]
4.19-upstream-stable: released (4.19.77) [6fbf866276089853727dd9b31f1d251e61dde367]
4.9-upstream-stable: released (4.9.195) [08d2af9358c1937acf97417dba9a03a40149c4d2]
-3.16-upstream-stable: pending (3.16.77) [appletalk-enforce-cap_net_raw-for-raw-sockets.patch]
+3.16-upstream-stable: released (3.16.77) [appletalk-enforce-cap_net_raw-for-raw-sockets.patch]
sid: released (5.3.7-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17055 b/active/CVE-2019-17055
index 82a57a889..b1fe3827d 100644
--- a/active/CVE-2019-17055
+++ b/active/CVE-2019-17055
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.4-rc1) [b91ee4aa2a2199ba4d4650706c272985a5a32d80]
4.19-upstream-stable: released (4.19.77) [50dddec689cb2105f6bccf4a2c6fe43dcc3295d7]
4.9-upstream-stable: released (4.9.195) [bb439ee217acbf7835af634f08875540c514632f]
-3.16-upstream-stable: pending (3.16.77) [misdn-enforce-cap_net_raw-for-raw-sockets.patch]
+3.16-upstream-stable: released (3.16.77) [misdn-enforce-cap_net_raw-for-raw-sockets.patch]
sid: released (5.3.7-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17056 b/active/CVE-2019-17056
index f92e59070..6278bba44 100644
--- a/active/CVE-2019-17056
+++ b/active/CVE-2019-17056
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.4-rc1) [3a359798b176183ef09efb7a3dc59abad1cc7104]
4.19-upstream-stable: released (4.19.77) [33fe1f517e29566d842535038be227c71a4bd54d]
4.9-upstream-stable: released (4.9.195) [45a9e9bc5d6742988df799dafbf26dca8e0dada3]
-3.16-upstream-stable: pending (3.16.77) [nfc-enforce-cap_net_raw-for-raw-sockets.patch]
+3.16-upstream-stable: released (3.16.77) [nfc-enforce-cap_net_raw-for-raw-sockets.patch]
sid: released (5.3.7-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17133 b/active/CVE-2019-17133
index faf6c1fa8..2d392b229 100644
--- a/active/CVE-2019-17133
+++ b/active/CVE-2019-17133
@@ -7,7 +7,7 @@ Bugs:
upstream: released (5.4-rc4) [4ac2813cc867ae563a1ba5a9414bfb554e5796fa]
4.19-upstream-stable: released (4.19.81) [73c066a9552a6d33ed7de002855337d1c966e8ce]
4.9-upstream-stable: released (4.9.198) [49d84740f8a7040354ef93bf5915a4b3e651e71b]
-3.16-upstream-stable: pending (3.16.77) [cfg80211-wext-avoid-copying-malformed-ssids.patch]
+3.16-upstream-stable: released (3.16.77) [cfg80211-wext-avoid-copying-malformed-ssids.patch]
sid: released (5.3.9-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17666 b/active/CVE-2019-17666
index 1a606d9d8..c6f894cf3 100644
--- a/active/CVE-2019-17666
+++ b/active/CVE-2019-17666
@@ -6,7 +6,7 @@ Bugs:
upstream: released (5.4-rc6) [8c55dedb795be8ec0cf488f98c03a1c2176f7fb1]
4.19-upstream-stable: released (4.19.82) [64efcbc7a5a3c7a14e42ccf7b8a7e7667d672a33]
4.9-upstream-stable: released (4.9.199) [4a2fbab9e82fb662ad3419525742a1ddfc29a7b9]
-3.16-upstream-stable: pending (3.16.77) [rtlwifi-fix-potential-overflow-on-p2p-code.patch]
+3.16-upstream-stable: released (3.16.77) [rtlwifi-fix-potential-overflow-on-p2p-code.patch]
sid: released (5.3.9-1)
4.19-buster-security: needed
4.9-stretch-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy