diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2021-08-07 09:46:42 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2021-08-07 09:46:42 +0200 |
commit | 49705637d7ba17e2b304ee0ab7fae18e01c74495 (patch) | |
tree | f593fcb7a2ffa2c294187b5ac7345cf8d717039a | |
parent | b20d6d3a3b569a75951c5e037e1a7a6527b5213d (diff) |
Several 5.10-bullseye-security issues as N/A (fixed before banching point)
37 files changed, 37 insertions, 0 deletions
diff --git a/active/CVE-2018-10322 b/active/CVE-2018-10322 index 0b7f6e30..87a30bb2 100644 --- a/active/CVE-2018-10322 +++ b/active/CVE-2018-10322 @@ -11,6 +11,7 @@ upstream: released (4.17-rc4) [b42db0860e13067fcc7cbfba3966c9e652668bbc] 3.16-upstream-stable: ignored "dinode verifier not implemented" 3.2-upstream-stable: ignored "dinode verifier not implemented" sid: released (4.16.5-1) [bugfix/all/xfs-enhance-dinode-verifier.patch] +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: ignored "dinode verifier not implemented" diff --git a/active/CVE-2018-12929 b/active/CVE-2018-12929 index 46a58cfd..ed631303 100644 --- a/active/CVE-2018-12929 +++ b/active/CVE-2018-12929 @@ -9,6 +9,7 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "ntfs is not supportable" sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: ignored "ntfs is not supportable" diff --git a/active/CVE-2018-12930 b/active/CVE-2018-12930 index 7d4010a4..7c28c0a3 100644 --- a/active/CVE-2018-12930 +++ b/active/CVE-2018-12930 @@ -10,6 +10,7 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "ntfs is not supportable" sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: ignored "ntfs is not supportable" diff --git a/active/CVE-2018-12931 b/active/CVE-2018-12931 index c96b69c5..fb992a43 100644 --- a/active/CVE-2018-12931 +++ b/active/CVE-2018-12931 @@ -10,6 +10,7 @@ upstream: needed 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "ntfs is not supportable" sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch] +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: ignored "ntfs is not supportable" diff --git a/active/CVE-2018-13095 b/active/CVE-2018-13095 index 7c6c1c97..c586fec3 100644 --- a/active/CVE-2018-13095 +++ b/active/CVE-2018-13095 @@ -13,6 +13,7 @@ upstream: released (4.18-rc3) [23fcb3340d033d9f081e21e6c12c2db7eaa541d3] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "Too risky to backport" sid: released (4.18.6-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: needed 3.16-jessie-security: ignored "Too risky to backport" diff --git a/active/CVE-2019-19036 b/active/CVE-2019-19036 index 3a7c4b82..ea177751 100644 --- a/active/CVE-2019-19036 +++ b/active/CVE-2019-19036 @@ -19,6 +19,7 @@ upstream: released (5.4-rc1) [62fdaa52a3d00a875da771719b6dc537ca79fce1] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "EOL" sid: released (5.3.7-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.131-1) 4.9-stretch-security: needed 3.16-jessie-security: ignored "EOL" diff --git a/active/CVE-2019-19039 b/active/CVE-2019-19039 index 578a498b..23b20f46 100644 --- a/active/CVE-2019-19039 +++ b/active/CVE-2019-19039 @@ -14,6 +14,7 @@ upstream: released (5.7-rc1) [b3ff8f1d380e65dddd772542aa9bff6c86bf715a] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "EOL" sid: released (5.6.7-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.160-1) 4.9-stretch-security: needed 3.16-jessie-security: ignored "EOL" diff --git a/active/CVE-2019-19377 b/active/CVE-2019-19377 index 06bd3490..8f7532a0 100644 --- a/active/CVE-2019-19377 +++ b/active/CVE-2019-19377 @@ -13,6 +13,7 @@ upstream: released (5.7-rc1) [b3ff8f1d380e65dddd772542aa9bff6c86bf715a] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "EOL" sid: released (5.6.7-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.160-1) 4.9-stretch-security: needed 3.16-jessie-security: ignored "EOL" diff --git a/active/CVE-2019-20811 b/active/CVE-2019-20811 index 96237172..0fe7e227 100644 --- a/active/CVE-2019-20811 +++ b/active/CVE-2019-20811 @@ -16,6 +16,7 @@ upstream: released (5.1-rc3) [a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e] 4.9-upstream-stable: needed 3.16-upstream-stable: released (3.16.72) [1b75034a1bb506abcabb2c2f9d7360020a7e2c42] sid: released (4.19.37-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: released (4.9.210-1+deb9u1) [bugfix/all/net-sysfs-call-dev_hold-if-kobject_init_and_add-succ.patch] 3.16-jessie-security: released (3.16.72-1) diff --git a/active/CVE-2019-2213 b/active/CVE-2019-2213 index 0d285007..a0ee1706 100644 --- a/active/CVE-2019-2213 +++ b/active/CVE-2019-2213 @@ -15,6 +15,7 @@ upstream: released (5.2-rc6) [a370003cc301d4361bae20c9ef615f89bf8d1e8a] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "not used in Android" sid: released (5.2.6-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.67-1) 4.9-stretch-security: needed 3.16-jessie-security: ignored "Android drivers not supported" diff --git a/active/CVE-2019-9245 b/active/CVE-2019-9245 index 6081f372..c674330b 100644 --- a/active/CVE-2019-9245 +++ b/active/CVE-2019-9245 @@ -9,6 +9,7 @@ upstream: released (5.0-rc1) [64beba0558fce7b59e9a8a7afd77290e82a22163] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "f2fs is not supportable" sid: released (4.19.16-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: ignored "f2fs is not supportable" 3.16-jessie-security: ignored "f2fs is not supportable" diff --git a/active/CVE-2019-9453 b/active/CVE-2019-9453 index da1f50c0..e1fa0174 100644 --- a/active/CVE-2019-9453 +++ b/active/CVE-2019-9453 @@ -10,6 +10,7 @@ upstream: released (5.2-rc1) [2777e654371dd4207a3a7f4fb5fa39550053a080] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "f2fs is not supportable" sid: released (5.2.6-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.67-1) 4.9-stretch-security: ignored "f2fs is not supportable" 3.16-jessie-security: ignored "f2fs is not supportable" diff --git a/active/CVE-2019-kvm-guest-xcr0 b/active/CVE-2019-kvm-guest-xcr0 index 0afd0eae..0b9b33fd 100644 --- a/active/CVE-2019-kvm-guest-xcr0 +++ b/active/CVE-2019-kvm-guest-xcr0 @@ -15,6 +15,7 @@ upstream: released (5.1-rc6) [1811d979c71621aafc7b879477202d286f7e863b] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "EOL" sid: released (5.2.6-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.87-1) 4.9-stretch-security: needed 3.16-jessie-security: ignored "EOL" diff --git a/active/CVE-2020-0030 b/active/CVE-2020-0030 index 47dfb2a2..c22f65dc 100644 --- a/active/CVE-2020-0030 +++ b/active/CVE-2020-0030 @@ -15,6 +15,7 @@ upstream: released (4.16-rc3) [5eeb2ca02a2f6084fc57ae5c244a38baab07033a] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "Too difficult and risky to backport" sid: released (4.15.11-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: N/A "Fixed before branching point" 4.9-stretch-security: ignored "binder not enabled, and risky to backport" 3.16-jessie-security: ignored "binder not enabled, and risky to backport" diff --git a/active/CVE-2020-0067 b/active/CVE-2020-0067 index eed125d3..2c83195f 100644 --- a/active/CVE-2020-0067 +++ b/active/CVE-2020-0067 @@ -9,6 +9,7 @@ upstream: released (5.5-rc1) [688078e7f36c293dae25b338ddc9e0a2790f6e06] 4.9-upstream-stable: needed 3.16-upstream-stable: ignored "f2fs is not supportable" sid: released (5.5.13-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.118-1) [bugfix/all/f2fs-fix-to-avoid-memory-leakage-in-f2fs_listxattr.patch] 4.9-stretch-security: ignored "f2fs is not supportable" 3.16-jessie-security: ignored "f2fs is not supportable" diff --git a/active/CVE-2020-16120 b/active/CVE-2020-16120 index d1874b4f..ecdcf75d 100644 --- a/active/CVE-2020-16120 +++ b/active/CVE-2020-16120 @@ -20,5 +20,6 @@ upstream: released (5.8-rc1) [48bd024b8a40d73ad6b086de2615738da0c7004f, 56230d95 4.19-upstream-stable: N/A "Vulnerable configuration not possible" 4.9-upstream-stable: N/A "Vulnerable configuration not possible" sid: released (5.8.7-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: N/A "Vulnerable configuration not possible" diff --git a/active/CVE-2020-26141 b/active/CVE-2020-26141 index 67f050b0..24ed6a0b 100644 --- a/active/CVE-2020-26141 +++ b/active/CVE-2020-26141 @@ -11,5 +11,6 @@ upstream: released (5.13-rc4) [0dc267b13f3a7e8424a898815dd357211b737330] 4.19-upstream-stable: needed 4.9-upstream-stable: sid: released (5.10.46-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: diff --git a/active/CVE-2020-26145 b/active/CVE-2020-26145 index cd077247..9ff4d5be 100644 --- a/active/CVE-2020-26145 +++ b/active/CVE-2020-26145 @@ -12,5 +12,6 @@ upstream: released (5.13-rc4) [65c415a144ad8132b6a6d97d4a1919ffc728e2d1, 40e7462 4.19-upstream-stable: 4.9-upstream-stable: sid: released (5.10.46-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: 4.9-stretch-security: diff --git a/active/CVE-2020-27835 b/active/CVE-2020-27835 index 0a30d2a5..7057197d 100644 --- a/active/CVE-2020-27835 +++ b/active/CVE-2020-27835 @@ -9,5 +9,6 @@ upstream: released (5.10-rc6) [3d2a9d642512c21a12d19b9250e7a835dcb41a79] 4.19-upstream-stable: needed 4.9-upstream-stable: needed sid: released (5.9.15-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2020-29374 b/active/CVE-2020-29374 index 9b44ca1f..95e1dc34 100644 --- a/active/CVE-2020-29374 +++ b/active/CVE-2020-29374 @@ -10,5 +10,6 @@ upstream: released (5.8-rc1) [17839856fd588f4ab6b789f482ed3ffd7c403e1f] 4.19-upstream-stable: released (4.19.189) [5e24029791e809d641e9ea46a1f99806484e53fc] 4.9-upstream-stable: needed sid: released (5.7.6-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.194-1) 4.9-stretch-security: released (4.9.272-1) [bugfix/all/gup-document-and-work-around-cow-can-break-either-wa.patch] diff --git a/active/CVE-2020-36310 b/active/CVE-2020-36310 index 3b89932c..f61db03c 100644 --- a/active/CVE-2020-36310 +++ b/active/CVE-2020-36310 @@ -10,5 +10,6 @@ upstream: released (5.8-rc1) [e72436bc3a5206f95bb384e741154166ddb3202e] 4.19-upstream-stable: needed 4.9-upstream-stable: N/A "Vulnerability introduced later" sid: released (5.8.7-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: N/A "Vulnerability introduced later" diff --git a/active/CVE-2020-36322 b/active/CVE-2020-36322 index 93c9e6f7..21084948 100644 --- a/active/CVE-2020-36322 +++ b/active/CVE-2020-36322 @@ -11,5 +11,6 @@ upstream: released (5.11-rc1) [5d069dbe8aaf2a197142558b6fb2978189ba3454] 4.19-upstream-stable: needed 4.9-upstream-stable: needed sid: released (5.10.9-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: released (4.9.272-1) [bugfix/all/fuse-fix-bad-inode.patch] diff --git a/active/CVE-2020-36385 b/active/CVE-2020-36385 index 0f50bbcf..1d1f016c 100644 --- a/active/CVE-2020-36385 +++ b/active/CVE-2020-36385 @@ -9,5 +9,6 @@ upstream: released (5.10-rc1) [f5449e74802c1112dea984aec8af7a33c4516af1] 4.19-upstream-stable: needed 4.9-upstream-stable: needed sid: released (5.10.4-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2021-20292 b/active/CVE-2021-20292 index 3ba0569b..7b6614f8 100644 --- a/active/CVE-2021-20292 +++ b/active/CVE-2021-20292 @@ -14,5 +14,6 @@ upstream: released (5.9-rc1) [5de5b6ecf97a021f29403aa272cb4e03318ef586] 4.19-upstream-stable: released (4.19.140) [10c8a526b2db1fcdf9e2d59d4885377b91939c55] 4.9-upstream-stable: needed sid: released (5.7.17-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.146-1) 4.9-stretch-security: released (4.9.272-1) [bugfix/all/drm-ttm-nouveau-don-t-call-tt-destroy-callback-on-al.patch] diff --git a/active/CVE-2021-22543 b/active/CVE-2021-22543 index 66c2ad35..3c7f043b 100644 --- a/active/CVE-2021-22543 +++ b/active/CVE-2021-22543 @@ -9,5 +9,6 @@ upstream: released (5.13) [f8be156be163a052a067306417cd0ff679068c97] 4.19-upstream-stable: released (4.19.199) [117777467bc015f0dc5fc079eeba0fa80c965149] 4.9-upstream-stable: needed sid: released (5.10.46-2) [bugfix/all/KVM-do-not-allow-mapping-valid-but-non-reference-cou.patch] +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2021-28950 b/active/CVE-2021-28950 index 333d46d2..77319caf 100644 --- a/active/CVE-2021-28950 +++ b/active/CVE-2021-28950 @@ -13,5 +13,6 @@ upstream: released (5.12-rc4) [775c5033a0d164622d9d10dd0f0a5531639ed3ed] 4.19-upstream-stable: needed 4.9-upstream-stable: needed sid: released (5.10.24-1) [bugfix/all/fuse-fix-live-lock-in-fuse_iget.patch] +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: released (4.9.272-1) [bugfix/all/fuse-fix-live-lock-in-fuse_iget.patch] diff --git a/active/CVE-2021-29264 b/active/CVE-2021-29264 index 381277d4..625d2bab 100644 --- a/active/CVE-2021-29264 +++ b/active/CVE-2021-29264 @@ -10,5 +10,6 @@ upstream: released (5.12-rc3) [d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f] 4.19-upstream-stable: released (4.19.184) [9943741c2792a7f1d091aad38f496ed6eb7681c4] 4.9-upstream-stable: needed sid: released (5.10.28-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.194-1) 4.9-stretch-security: needed diff --git a/active/CVE-2021-33033 b/active/CVE-2021-33033 index 8a84777c..81a9e57c 100644 --- a/active/CVE-2021-33033 +++ b/active/CVE-2021-33033 @@ -17,5 +17,6 @@ upstream: released (5.12-rc7) [ad5d07f4a9cd671233ae20983848874731102c08] 4.19-upstream-stable: released (4.19.181) [a44af1c69737f9e64d5134c34eb9d5c4c2e04da1] 4.9-upstream-stable: needed sid: released (5.10.24-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.181-1) 4.9-stretch-security: needed diff --git a/active/CVE-2021-33624 b/active/CVE-2021-33624 index 90132c17..7444d940 100644 --- a/active/CVE-2021-33624 +++ b/active/CVE-2021-33624 @@ -10,5 +10,6 @@ upstream: released (5.13-rc7) [d203b0fd863a2261e5d00b97f3d060c4c2a6db71, fe9a5ca 4.19-upstream-stable: needed 4.9-upstream-stable: needed sid: released (5.10.46-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2021-3444 b/active/CVE-2021-3444 index e42fdd4f..7dd42300 100644 --- a/active/CVE-2021-3444 +++ b/active/CVE-2021-3444 @@ -18,5 +18,6 @@ upstream: released (5.12-rc1) [9b00f1b78809309163dda2d044d9e94a3c0248a3] 4.19-upstream-stable: needed 4.9-upstream-stable: N/A "Vulnerable code introduced later" sid: released (5.10.19-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: N/A "Vulnerable code introduced later" diff --git a/active/CVE-2021-34556 b/active/CVE-2021-34556 index f361b00e..67518656 100644 --- a/active/CVE-2021-34556 +++ b/active/CVE-2021-34556 @@ -8,5 +8,6 @@ upstream: released (5.14-rc4) [f5e81d1117501546b7be050c5fbafa6efd2c722c, 2039f26 4.19-upstream-stable: 4.9-upstream-stable: sid: released (5.10.46-4) [bugfix/all/bpf-introduce-bpf-nospec-instruction-for-mitigating-.patch, bugfix/all/bpf-fix-leakage-due-to-insufficient-speculative-stor.patch] +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: 4.9-stretch-security: diff --git a/active/CVE-2021-3493 b/active/CVE-2021-3493 index 9cbc79c7..920ef556 100644 --- a/active/CVE-2021-3493 +++ b/active/CVE-2021-3493 @@ -14,5 +14,6 @@ upstream: released (5.11-rc1) [7c03e2cda4a584cadc398e8f6641ca9988a39d52] 4.19-upstream-stable: needed 4.9-upstream-stable: N/A "Unprivileged users cannot mount overlayfs" sid: released (5.10.38-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: N/A "Unprivileged users cannot mount overlayfs" diff --git a/active/CVE-2021-3506 b/active/CVE-2021-3506 index a9086327..5748f4e4 100644 --- a/active/CVE-2021-3506 +++ b/active/CVE-2021-3506 @@ -11,5 +11,6 @@ upstream: released (5.13-rc1) [b862676e371715456c9dade7990c8004996d0d9e] 4.19-upstream-stable: released (4.19.191) [bfa08a47cea2a9fab077c7135b9cfdf04e69c67a] 4.9-upstream-stable: needed sid: released (5.10.38-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.194-1) 4.9-stretch-security: ignored "f2fs is not supportable" diff --git a/active/CVE-2021-35477 b/active/CVE-2021-35477 index f361b00e..67518656 100644 --- a/active/CVE-2021-35477 +++ b/active/CVE-2021-35477 @@ -8,5 +8,6 @@ upstream: released (5.14-rc4) [f5e81d1117501546b7be050c5fbafa6efd2c722c, 2039f26 4.19-upstream-stable: 4.9-upstream-stable: sid: released (5.10.46-4) [bugfix/all/bpf-introduce-bpf-nospec-instruction-for-mitigating-.patch, bugfix/all/bpf-fix-leakage-due-to-insufficient-speculative-stor.patch] +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: 4.9-stretch-security: diff --git a/active/CVE-2021-3600 b/active/CVE-2021-3600 index 2ad30987..523b98e4 100644 --- a/active/CVE-2021-3600 +++ b/active/CVE-2021-3600 @@ -12,5 +12,6 @@ upstream: released (5.11) [e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90] 4.19-upstream-stable: needed 4.9-upstream-stable: needed sid: released (5.10.19-1) +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: needed diff --git a/active/CVE-2021-3612 b/active/CVE-2021-3612 index cef46f4a..b316ce3c 100644 --- a/active/CVE-2021-3612 +++ b/active/CVE-2021-3612 @@ -14,5 +14,6 @@ upstream: released (5.14-rc1) [f8f84af5da9ee04ef1d271528656dac42a090d00] 4.19-upstream-stable: released (4.19.198) [b62ce8e3f7fbd81ea7c9341ac5e0d445f685f6af] 4.9-upstream-stable: released (4.9.276) [f3673f6f63db2aa08c35e707a2fdcbcc6590c391] sid: released (5.10.46-3) [bugfix/all/Input-joydev-prevent-use-of-not-validated-data-in-JS.patch] +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: pending (4.9.276-1) diff --git a/active/CVE-2021-3655 b/active/CVE-2021-3655 index fe308e3f..1eccf90b 100644 --- a/active/CVE-2021-3655 +++ b/active/CVE-2021-3655 @@ -9,5 +9,6 @@ upstream: released (5.14-rc1) [0c5dc070ff3d6246d22ddd931f23a6266249e3db, 50619db 4.19-upstream-stable: released (4.19.198) [c7a03ebace4f9cd40d9cd9dd5fb2af558025583c, dd16e38e1531258d332b0fc7c247367f60c6c381] 4.9-upstream-stable: released (4.9.276) [c7da1d1ed43a6c2bece0d287e2415adf2868697e] sid: released (5.10.46-3) [bugfix/all/sctp-validate-from_addr_param-return.patch, bugfix/all/sctp-add-size-validation-when-walking-chunks.patch] +5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: needed 4.9-stretch-security: pending (4.9.276-1) |