summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-05-10 06:28:14 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2021-05-10 06:28:14 +0200
commit0eee0c2c6cf96d698a82d3d9ffc06dd6370c1a44 (patch)
tree8ffb91042f1b99cada92a2fbe30f23c5d32d3e37
parent695dfb28fa8ad770f9916d4a52ceb1a0b54b4d53 (diff)
Track issues released in 5.13-rc1 upstream
-rw-r--r--active/CVE-2020-265412
-rw-r--r--active/CVE-2021-231342
-rw-r--r--active/CVE-2021-318292
-rw-r--r--active/CVE-2021-34912
-rw-r--r--active/CVE-2021-35062
5 files changed, 5 insertions, 5 deletions
diff --git a/active/CVE-2020-26541 b/active/CVE-2020-26541
index e1fd2f58..3dd2e449 100644
--- a/active/CVE-2020-26541
+++ b/active/CVE-2020-26541
@@ -7,7 +7,7 @@ Notes:
bwh> This is only relevant to kernel versions that support the
bwh> UEFI Secure Boot key store and/or are themselves signed.
Bugs:
-upstream: pending [56c5812623f95313f6a46fbf0beee7fa17c68bbf]
+upstream: released (5.13-rc1) [56c5812623f95313f6a46fbf0beee7fa17c68bbf]
5.10-upstream-stable: needed
4.19-upstream-stable: N/A "Secure Boot key import not supported"
4.9-upstream-stable: N/A "Secure Boot key import not supported"
diff --git a/active/CVE-2021-23134 b/active/CVE-2021-23134
index f55b36f7..19be5520 100644
--- a/active/CVE-2021-23134
+++ b/active/CVE-2021-23134
@@ -2,7 +2,7 @@ Description: net/nfc: fix use-after-free llcp_sock_bind/connect
References:
Notes:
Bugs:
-upstream: pending [c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6]
+upstream: released (5.13-rc1) [c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6]
5.10-upstream-stable:
4.19-upstream-stable:
4.9-upstream-stable:
diff --git a/active/CVE-2021-31829 b/active/CVE-2021-31829
index 16a348fc..28e7112c 100644
--- a/active/CVE-2021-31829
+++ b/active/CVE-2021-31829
@@ -5,7 +5,7 @@ References:
https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=801c6058d14a82179a7ee17a4b532cac6fad067f
Notes:
Bugs:
-upstream: needed
+upstream: released (5.13-rc1) [b9b34ddbe2076ade359cd5ce7537d5ed019e9807, 801c6058d14a82179a7ee17a4b532cac6fad067f]
5.10-upstream-stable: released (5.10.35) [2cfa537674cd1051a3b8111536d77d0558f33d5d, 2fa15d61e4cbaaa1d1250e67b251ff96952fa614]
4.19-upstream-stable: released (4.19.190) [0e2dfdc74a7f4036127356d42ea59388f153f42c]
4.9-upstream-stable:
diff --git a/active/CVE-2021-3491 b/active/CVE-2021-3491
index 0888f950..6c52c8bf 100644
--- a/active/CVE-2021-3491
+++ b/active/CVE-2021-3491
@@ -4,7 +4,7 @@ Notes:
carnil> Commit fixes ddf0322db79c ("io_uring: add
carnil> IORING_OP_PROVIDE_BUFFERS") in 5.7-rc1.
Bugs:
-upstream: pending [d1f82808877bb10d3deee7cf3374a4eb3fb582db]
+upstream: released (5.13-rc1) [d1f82808877bb10d3deee7cf3374a4eb3fb582db]
5.10-upstream-stable: needed
4.19-upstream-stable: N/A "Vulnerable code introduced later"
4.9-upstream-stable: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2021-3506 b/active/CVE-2021-3506
index 9d10f3f9..109fabf1 100644
--- a/active/CVE-2021-3506
+++ b/active/CVE-2021-3506
@@ -5,7 +5,7 @@ References:
https://lore.kernel.org/lkml/20210322114730.71103-1-yuchao0@huawei.com/
Notes:
Bugs:
-upstream: pending [b862676e371715456c9dade7990c8004996d0d9e]
+upstream: released (5.13-rc1) [b862676e371715456c9dade7990c8004996d0d9e]
5.10-upstream-stable:
4.19-upstream-stable:
4.9-upstream-stable:

© 2014-2024 Faster IT GmbH | imprint | privacy policy