summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2019-11-15 13:50:02 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2019-11-15 13:50:02 +0100
commit2d2d0e34db6c0c914d497d6529c0cf03236662e9 (patch)
treed87273c5cd55196edeebd5b2d975b2d397a6b860
parent278ed38316e659c174adb6fb5ae2f234258f1de9 (diff)
Track upstream commits in 3.16.77
Well both work obviously as the filenames are the official patch names, but for consistency opted to replace them with the respective upstream commit ids. Hope this is fine with anybody (probbly actually mostly Ben!) reviewing this change.
-rw-r--r--active/CVE-2019-01542
-rw-r--r--active/CVE-2019-111352
-rw-r--r--active/CVE-2019-150982
-rw-r--r--active/CVE-2019-152172
-rw-r--r--active/CVE-2019-155052
-rw-r--r--active/CVE-2019-170522
-rw-r--r--active/CVE-2019-170532
-rw-r--r--active/CVE-2019-170542
-rw-r--r--active/CVE-2019-170552
-rw-r--r--active/CVE-2019-170562
-rw-r--r--active/CVE-2019-171332
-rw-r--r--active/CVE-2019-176662
12 files changed, 12 insertions, 12 deletions
diff --git a/active/CVE-2019-0154 b/active/CVE-2019-0154
index 908116874..9ce9a5496 100644
--- a/active/CVE-2019-0154
+++ b/active/CVE-2019-0154
@@ -8,7 +8,7 @@ Bugs:
upstream: pending (5.4) [1d85a299c4db57c55e0229615132c964d17aa765, 7e34f4e4aad3fd34c02b294a3cf2321adf5b4438]
4.19-upstream-stable: released (4.19.84) [011b7173cbdbd1a5f1826656693ea51516f15dc1, 255ed51599dea571ac15afc676b2705cf2f83975]
4.9-upstream-stable: released (4.9.201) [ebd6ded190ed0920c16eb63f274b50ca050e46fb, 00194ecfb32cab5bc20ce1308c681c47094015bd]
-3.16-upstream-stable: released (3.16.77) [drm-i915-gen8-add-rc6-ctx-corruption-wa.patch]
+3.16-upstream-stable: released (3.16.77) [5013e6d917ac9f3df823d94d17e9cfe99c003517]
sid: released (5.3.9-2) [bugfix/x86/i915/0011-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs.patch, bugfix/x86/i915/0012-drm-i915-gen8-Add-RC6-CTX-corruption-WA.patch]
4.19-buster-security: released (4.19.67-2+deb10u2) [bugfix/x86/i915/0011-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs.patch, bugfix/x86/i915/0012-drm-i915-gen8-Add-RC6-CTX-corruption-WA.patch]
4.9-stretch-security: released (4.9.189-3+deb9u2) [bugfix/x86/i915/0011-drm-i915-Lower-RM-timeout-to-avoid-DSI-hard-hangs.patch, bugfix/x86/i915/0012-drm-i915-gen8-Add-RC6-CTX-corruption-WA.patch]
diff --git a/active/CVE-2019-11135 b/active/CVE-2019-11135
index 0504e9b8d..563fe25a7 100644
--- a/active/CVE-2019-11135
+++ b/active/CVE-2019-11135
@@ -12,7 +12,7 @@ Bugs:
upstream: pending (5.4) [c2955f270a84762343000f103e0640d29c7a96f3, 286836a70433fb64131d2590f4bf512097c255e1, 95c5824f75f3ba4c9e8e5a4b1a623c95390ac266, 1b42f017415b46c317e71d41c34ec088417a1883, 6608b45ac5ecb56f9e171252229c39580cc85f0f, e1d38b63acd843cfdd4222bf19a26700fd5c699e, 7531a3596e3272d1f6841e0d601a614555dc6b65, a7a248c593e4fd7a67c50b5f5318fe42a0db335e, db616173d787395787ecc93eef075fa975227b10, 012206a822a8b6ac09125bfaa210a95b9eb8f1c1]
4.19-upstream-stable: released (4.19.84) [4002d16a2ae1e3bdc0aa36ce5089bd62b4b9eab6, 37cf9ef900ccb3183c84b2181291b23927cf8002, b8eb348ae40878a5a0a4de444fa5d2ea8a539f6c, 6c58ea8525bf6df7f4df2692784d2ce315201895, 15dfa5d706df85506a527c5572be5ff322031a01, a0808f06dfa1adca8e81716cf773db8c8f1c07b9, 2402432d55576a2c35546c72d19893a21edbf133, e3bf6b3ff55a549cef225bb25724aa7858377c15, 4ad7466ddf2d78ad2e3f700ed69b694b9f232896, 415bb221a07038f7a54c4187f1aef1e8e2a4925f]
4.9-upstream-stable: needed
-3.16-upstream-stable: released (3.16.77) [x86-msr-add-the-ia32_tsx_ctrl-msr.patch, x86-cpu-add-a-helper-function-x86_read_arch_cap_msr.patch, x86-cpu-add-a-tsx-cmdline-option-with-tsx-disabled-by-default.patch, x86-speculation-taa-add-mitigation-for-tsx-async-abort.patch, x86-speculation-taa-add-sysfs-reporting-for-tsx-async-abort.patch, kvm-x86-export-mds_no-0-to-guests-when-tsx-is-enabled.patch, x86-tsx-add-auto-option-to-the-tsx-cmdline-parameter.patch, x86-speculation-taa-add-documentation-for-tsx-async-abort.patch, x86-tsx-add-config-options-to-set-tsx-on-off-auto.patch, x86-speculation-taa-fix-printing-of-taa_msg_smt-on-ibrs_all-cpus.patch]
+3.16-upstream-stable: released (3.16.77) [6608a10cecfd899b4e8650aa9149ca5a6171fc43, 490421fb060b7487fc6e4fe2efb27820b0b535eb, 8b149657bc70145a6c6f41e43d7b5d90d7d23d99, 8f250aefe83f06c5765c21f44409bd5c2080803b, f21f3516be7ce2340f1afd5c3513c6319ca23d2f, 67323ec3ec3be6f5fcf2d6373701716b50c2a59d, 366507333e0b8f83009fabea746ff0ad6d7c7641, 0cdefbadb02aafd93efd4a9b118a6d07bfc742da, 55799096de726a647233c21c3fd294f55580f2b7, 88d7d95283ef74c9fa3733e811ab8498eebc827c]
sid: released (5.3.9-2) [bugfix/x86/taa/0001-x86-msr-Add-the-IA32_TSX_CTRL-MSR.patch, bugfix/x86/taa/0002-x86-cpu-Add-a-helper-function-x86_read_arch_cap_msr.patch, bugfix/x86/taa/0003-x86-cpu-Add-a-tsx-cmdline-option-with-TSX-disabled-b.patch, bugfix/x86/taa/0004-x86-speculation-taa-Add-mitigation-for-TSX-Async-Abo.patch, bugfix/x86/taa/0005-x86-speculation-taa-Add-sysfs-reporting-for-TSX-Asyn.patch, bugfix/x86/taa/0006-kvm-x86-Export-MDS_NO-0-to-guests-when-TSX-is-enable.patch, bugfix/x86/taa/0007-x86-tsx-Add-auto-option-to-the-tsx-cmdline-parameter.patch, bugfix/x86/taa/0008-x86-speculation-taa-Add-documentation-for-TSX-Async-.patch, bugfix/x86/taa/0009-x86-tsx-Add-config-options-to-set-tsx-on-off-auto.patch, bugfix/x86/taa/0010-x86-speculation-taa-Fix-printing-of-TAA_MSG_SMT-on-I.patch]
4.19-buster-security: released (4.19.67-2+deb10u2) [bugfix/x86/taa/0001-KVM-x86-use-Intel-speculation-bugs-and-features-as-d.patch, bugfix/x86/taa/0002-x86-msr-Add-the-IA32_TSX_CTRL-MSR.patch, bugfix/x86/taa/0003-x86-cpu-Add-a-helper-function-x86_read_arch_cap_msr.patch, bugfix/x86/taa/0004-x86-cpu-Add-a-tsx-cmdline-option-with-TSX-disabled-b.patch, bugfix/x86/taa/0005-x86-speculation-taa-Add-mitigation-for-TSX-Async-Abo.patch, bugfix/x86/taa/0006-x86-speculation-taa-Add-sysfs-reporting-for-TSX-Asyn.patch, bugfix/x86/taa/0007-kvm-x86-Export-MDS_NO-0-to-guests-when-TSX-is-enable.patch, bugfix/x86/taa/0008-x86-tsx-Add-auto-option-to-the-tsx-cmdline-parameter.patch, bugfix/x86/taa/0009-x86-speculation-taa-Add-documentation-for-TSX-Async-.patch, bugfix/x86/taa/0010-x86-tsx-Add-config-options-to-set-tsx-on-off-auto.patch, bugfix/x86/taa/0015-x86-speculation-taa-Fix-printing-of-TAA_MSG_SMT-on-I.patch]
4.9-stretch-security: released (4.9.189-3+deb9u2) [bugfix/x86/taa/0001-KVM-x86-use-Intel-speculation-bugs-and-features-as-d.patch, bugfix/x86/taa/0002-x86-msr-Add-the-IA32_TSX_CTRL-MSR.patch, bugfix/x86/taa/0003-x86-cpu-Add-a-helper-function-x86_read_arch_cap_msr.patch, bugfix/x86/taa/0004-x86-cpu-Add-a-tsx-cmdline-option-with-TSX-disabled-b.patch, bugfix/x86/taa/0005-x86-speculation-taa-Add-mitigation-for-TSX-Async-Abo.patch, bugfix/x86/taa/0006-x86-speculation-taa-Add-sysfs-reporting-for-TSX-Asyn.patch, bugfix/x86/taa/0007-kvm-x86-Export-MDS_NO-0-to-guests-when-TSX-is-enable.patch, bugfix/x86/taa/0008-x86-tsx-Add-auto-option-to-the-tsx-cmdline-parameter.patch, bugfix/x86/taa/0009-x86-speculation-taa-Add-documentation-for-TSX-Async-.patch, bugfix/x86/taa/0010-x86-tsx-Add-config-options-to-set-tsx-on-off-auto.patch, bugfix/x86/taa/0011-x86-speculation-taa-Fix-printing-of-TAA_MSG_SMT-on-I.patch]
diff --git a/active/CVE-2019-15098 b/active/CVE-2019-15098
index 014b5a109..c6fbd21c2 100644
--- a/active/CVE-2019-15098
+++ b/active/CVE-2019-15098
@@ -9,7 +9,7 @@ Bugs:
upstream: released (5.4-rc1) [39d170b3cb62ba98567f5c4f40c27b5864b304e5]
4.19-upstream-stable: released (4.19.82) [696da02259463ea634821e117088f82afe7bf851]
4.9-upstream-stable: released (4.9.199) [3c7f02d13b8d72dbb1dd9b0fe858459d263b1fbd]
-3.16-upstream-stable: released (3.16.77) [ath6kl-fix-a-null-ptr-deref-bug-in-ath6kl_usb_alloc_urb_from_pipe.patch]
+3.16-upstream-stable: released (3.16.77) [3e8e6f9a952c9a7e0be92518906dcdb7c8d1ca29]
sid: released (5.3.7-1) [bugfix/all/ath6kl-fix-a-NULL-ptr-deref-bug-in-ath6kl_usb_alloc_.patch]
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-15217 b/active/CVE-2019-15217
index cefc03294..547492621 100644
--- a/active/CVE-2019-15217
+++ b/active/CVE-2019-15217
@@ -8,7 +8,7 @@ Bugs:
upstream: released (5.3-rc1) [5d2e73a5f80a5b5aff3caf1ec6d39b5b3f54b26e]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
-3.16-upstream-stable: released (3.16.77) [media-usb-zr364xx-fix-kasan-null-ptr-deref-read-in.patch]
+3.16-upstream-stable: released (3.16.77) [4accfbf9527ed191513f4d2d738caf15ad4e8657]
sid: released (5.2.6-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-15505 b/active/CVE-2019-15505
index e3d8c6dbb..fb95a627e 100644
--- a/active/CVE-2019-15505
+++ b/active/CVE-2019-15505
@@ -9,7 +9,7 @@ Bugs:
upstream: released (5.4-rc1) [0c4df39e504bf925ab666132ac3c98d6cbbe380b]
4.19-upstream-stable: released (4.19.75) [b841a9f58d9c778d8c2c5f636dc06a53b9a47fa1]
4.9-upstream-stable: released (4.9.194) [994c6dcb4307759d440b8031e140d343b8611481]
-3.16-upstream-stable: released (3.16.77) [media-technisat-usb2-break-out-of-loop-at-end-of-buffer.patch]
+3.16-upstream-stable: released (3.16.77) [2389a6543a1c2b3bd1ab5dae04d23c3ed9c95752]
sid: released (5.2.17-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17052 b/active/CVE-2019-17052
index e76340b2d..6437f0fdf 100644
--- a/active/CVE-2019-17052
+++ b/active/CVE-2019-17052
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.4-rc1) [0614e2b73768b502fc32a75349823356d98aae2c]
4.19-upstream-stable: released (4.19.77) [6f0f18e532693ecc1e0c7938e0d63531ea62bc3e]
4.9-upstream-stable: released (4.9.195) [73b8d26c842a5a3be34a321beab1f97939d9794b]
-3.16-upstream-stable: released (3.16.77) [ax25-enforce-cap_net_raw-for-raw-sockets.patch]
+3.16-upstream-stable: released (3.16.77) [2c675dab816278a1724c1e93b384c2f05a11cb31]
sid: released (5.3.7-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17053 b/active/CVE-2019-17053
index 6b93dbcfd..e4873156d 100644
--- a/active/CVE-2019-17053
+++ b/active/CVE-2019-17053
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.4-rc1) [e69dbd4619e7674c1679cba49afd9dd9ac347eef]
4.19-upstream-stable: released (4.19.77) [dd651ab7a11436f787aed0a987c85864b261ff19]
4.9-upstream-stable: released (4.9.195) [ddca1f39c8980cb19db5ea6d51b8549288a7421b]
-3.16-upstream-stable: released (3.16.77) [ieee802154-enforce-cap_net_raw-for-raw-sockets.patch]
+3.16-upstream-stable: released (3.16.77) [b8a15d59a9b26a734f6d8d5f10376f336f7d021b]
sid: released (5.3.7-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17054 b/active/CVE-2019-17054
index f92937857..5e511bde2 100644
--- a/active/CVE-2019-17054
+++ b/active/CVE-2019-17054
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.4-rc1) [6cc03e8aa36c51f3b26a0d21a3c4ce2809c842ac]
4.19-upstream-stable: released (4.19.77) [6fbf866276089853727dd9b31f1d251e61dde367]
4.9-upstream-stable: released (4.9.195) [08d2af9358c1937acf97417dba9a03a40149c4d2]
-3.16-upstream-stable: released (3.16.77) [appletalk-enforce-cap_net_raw-for-raw-sockets.patch]
+3.16-upstream-stable: released (3.16.77) [2d4020439bd19f2a498a7fccd8755521a90b2886]
sid: released (5.3.7-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17055 b/active/CVE-2019-17055
index b1fe3827d..4feddacb4 100644
--- a/active/CVE-2019-17055
+++ b/active/CVE-2019-17055
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.4-rc1) [b91ee4aa2a2199ba4d4650706c272985a5a32d80]
4.19-upstream-stable: released (4.19.77) [50dddec689cb2105f6bccf4a2c6fe43dcc3295d7]
4.9-upstream-stable: released (4.9.195) [bb439ee217acbf7835af634f08875540c514632f]
-3.16-upstream-stable: released (3.16.77) [misdn-enforce-cap_net_raw-for-raw-sockets.patch]
+3.16-upstream-stable: released (3.16.77) [f49bd6510620b9cd434b87bea639f07dfde56f09]
sid: released (5.3.7-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17056 b/active/CVE-2019-17056
index 6278bba44..95088802e 100644
--- a/active/CVE-2019-17056
+++ b/active/CVE-2019-17056
@@ -5,7 +5,7 @@ Bugs:
upstream: released (5.4-rc1) [3a359798b176183ef09efb7a3dc59abad1cc7104]
4.19-upstream-stable: released (4.19.77) [33fe1f517e29566d842535038be227c71a4bd54d]
4.9-upstream-stable: released (4.9.195) [45a9e9bc5d6742988df799dafbf26dca8e0dada3]
-3.16-upstream-stable: released (3.16.77) [nfc-enforce-cap_net_raw-for-raw-sockets.patch]
+3.16-upstream-stable: released (3.16.77) [bc3d2e9cfdc5c1b7e5ed34eb5279e47d462b4d5c]
sid: released (5.3.7-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17133 b/active/CVE-2019-17133
index 2d392b229..051b798e9 100644
--- a/active/CVE-2019-17133
+++ b/active/CVE-2019-17133
@@ -7,7 +7,7 @@ Bugs:
upstream: released (5.4-rc4) [4ac2813cc867ae563a1ba5a9414bfb554e5796fa]
4.19-upstream-stable: released (4.19.81) [73c066a9552a6d33ed7de002855337d1c966e8ce]
4.9-upstream-stable: released (4.9.198) [49d84740f8a7040354ef93bf5915a4b3e651e71b]
-3.16-upstream-stable: released (3.16.77) [cfg80211-wext-avoid-copying-malformed-ssids.patch]
+3.16-upstream-stable: released (3.16.77) [e70efb76ea2eb9f08dc627d93d35a8e5c065346d]
sid: released (5.3.9-1)
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2019-17666 b/active/CVE-2019-17666
index c6f894cf3..8dfbc6ca5 100644
--- a/active/CVE-2019-17666
+++ b/active/CVE-2019-17666
@@ -6,7 +6,7 @@ Bugs:
upstream: released (5.4-rc6) [8c55dedb795be8ec0cf488f98c03a1c2176f7fb1]
4.19-upstream-stable: released (4.19.82) [64efcbc7a5a3c7a14e42ccf7b8a7e7667d672a33]
4.9-upstream-stable: released (4.9.199) [4a2fbab9e82fb662ad3419525742a1ddfc29a7b9]
-3.16-upstream-stable: released (3.16.77) [rtlwifi-fix-potential-overflow-on-p2p-code.patch]
+3.16-upstream-stable: released (3.16.77) [b78c8469ceff4288d1092e22bfb277d3bd0d7147]
sid: released (5.3.9-1)
4.19-buster-security: needed
4.9-stretch-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy