summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-08-07 09:46:42 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2021-08-07 09:46:42 +0200
commit49705637d7ba17e2b304ee0ab7fae18e01c74495 (patch)
treef593fcb7a2ffa2c294187b5ac7345cf8d717039a
parentb20d6d3a3b569a75951c5e037e1a7a6527b5213d (diff)
Several 5.10-bullseye-security issues as N/A (fixed before banching point)
-rw-r--r--active/CVE-2018-103221
-rw-r--r--active/CVE-2018-129291
-rw-r--r--active/CVE-2018-129301
-rw-r--r--active/CVE-2018-129311
-rw-r--r--active/CVE-2018-130951
-rw-r--r--active/CVE-2019-190361
-rw-r--r--active/CVE-2019-190391
-rw-r--r--active/CVE-2019-193771
-rw-r--r--active/CVE-2019-208111
-rw-r--r--active/CVE-2019-22131
-rw-r--r--active/CVE-2019-92451
-rw-r--r--active/CVE-2019-94531
-rw-r--r--active/CVE-2019-kvm-guest-xcr01
-rw-r--r--active/CVE-2020-00301
-rw-r--r--active/CVE-2020-00671
-rw-r--r--active/CVE-2020-161201
-rw-r--r--active/CVE-2020-261411
-rw-r--r--active/CVE-2020-261451
-rw-r--r--active/CVE-2020-278351
-rw-r--r--active/CVE-2020-293741
-rw-r--r--active/CVE-2020-363101
-rw-r--r--active/CVE-2020-363221
-rw-r--r--active/CVE-2020-363851
-rw-r--r--active/CVE-2021-202921
-rw-r--r--active/CVE-2021-225431
-rw-r--r--active/CVE-2021-289501
-rw-r--r--active/CVE-2021-292641
-rw-r--r--active/CVE-2021-330331
-rw-r--r--active/CVE-2021-336241
-rw-r--r--active/CVE-2021-34441
-rw-r--r--active/CVE-2021-345561
-rw-r--r--active/CVE-2021-34931
-rw-r--r--active/CVE-2021-35061
-rw-r--r--active/CVE-2021-354771
-rw-r--r--active/CVE-2021-36001
-rw-r--r--active/CVE-2021-36121
-rw-r--r--active/CVE-2021-36551
37 files changed, 37 insertions, 0 deletions
diff --git a/active/CVE-2018-10322 b/active/CVE-2018-10322
index 0b7f6e30..87a30bb2 100644
--- a/active/CVE-2018-10322
+++ b/active/CVE-2018-10322
@@ -11,6 +11,7 @@ upstream: released (4.17-rc4) [b42db0860e13067fcc7cbfba3966c9e652668bbc]
3.16-upstream-stable: ignored "dinode verifier not implemented"
3.2-upstream-stable: ignored "dinode verifier not implemented"
sid: released (4.16.5-1) [bugfix/all/xfs-enhance-dinode-verifier.patch]
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: ignored "dinode verifier not implemented"
diff --git a/active/CVE-2018-12929 b/active/CVE-2018-12929
index 46a58cfd..ed631303 100644
--- a/active/CVE-2018-12929
+++ b/active/CVE-2018-12929
@@ -9,6 +9,7 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "ntfs is not supportable"
sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: ignored "ntfs is not supportable"
diff --git a/active/CVE-2018-12930 b/active/CVE-2018-12930
index 7d4010a4..7c28c0a3 100644
--- a/active/CVE-2018-12930
+++ b/active/CVE-2018-12930
@@ -10,6 +10,7 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "ntfs is not supportable"
sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: ignored "ntfs is not supportable"
diff --git a/active/CVE-2018-12931 b/active/CVE-2018-12931
index c96b69c5..fb992a43 100644
--- a/active/CVE-2018-12931
+++ b/active/CVE-2018-12931
@@ -10,6 +10,7 @@ upstream: needed
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "ntfs is not supportable"
sid: released (4.19.37-1) [debian/ntfs-mark-it-as-broken.patch]
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: ignored "ntfs is not supportable"
diff --git a/active/CVE-2018-13095 b/active/CVE-2018-13095
index 7c6c1c97..c586fec3 100644
--- a/active/CVE-2018-13095
+++ b/active/CVE-2018-13095
@@ -13,6 +13,7 @@ upstream: released (4.18-rc3) [23fcb3340d033d9f081e21e6c12c2db7eaa541d3]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "Too risky to backport"
sid: released (4.18.6-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: needed
3.16-jessie-security: ignored "Too risky to backport"
diff --git a/active/CVE-2019-19036 b/active/CVE-2019-19036
index 3a7c4b82..ea177751 100644
--- a/active/CVE-2019-19036
+++ b/active/CVE-2019-19036
@@ -19,6 +19,7 @@ upstream: released (5.4-rc1) [62fdaa52a3d00a875da771719b6dc537ca79fce1]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "EOL"
sid: released (5.3.7-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.131-1)
4.9-stretch-security: needed
3.16-jessie-security: ignored "EOL"
diff --git a/active/CVE-2019-19039 b/active/CVE-2019-19039
index 578a498b..23b20f46 100644
--- a/active/CVE-2019-19039
+++ b/active/CVE-2019-19039
@@ -14,6 +14,7 @@ upstream: released (5.7-rc1) [b3ff8f1d380e65dddd772542aa9bff6c86bf715a]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "EOL"
sid: released (5.6.7-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.160-1)
4.9-stretch-security: needed
3.16-jessie-security: ignored "EOL"
diff --git a/active/CVE-2019-19377 b/active/CVE-2019-19377
index 06bd3490..8f7532a0 100644
--- a/active/CVE-2019-19377
+++ b/active/CVE-2019-19377
@@ -13,6 +13,7 @@ upstream: released (5.7-rc1) [b3ff8f1d380e65dddd772542aa9bff6c86bf715a]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "EOL"
sid: released (5.6.7-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.160-1)
4.9-stretch-security: needed
3.16-jessie-security: ignored "EOL"
diff --git a/active/CVE-2019-20811 b/active/CVE-2019-20811
index 96237172..0fe7e227 100644
--- a/active/CVE-2019-20811
+++ b/active/CVE-2019-20811
@@ -16,6 +16,7 @@ upstream: released (5.1-rc3) [a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e]
4.9-upstream-stable: needed
3.16-upstream-stable: released (3.16.72) [1b75034a1bb506abcabb2c2f9d7360020a7e2c42]
sid: released (4.19.37-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: released (4.9.210-1+deb9u1) [bugfix/all/net-sysfs-call-dev_hold-if-kobject_init_and_add-succ.patch]
3.16-jessie-security: released (3.16.72-1)
diff --git a/active/CVE-2019-2213 b/active/CVE-2019-2213
index 0d285007..a0ee1706 100644
--- a/active/CVE-2019-2213
+++ b/active/CVE-2019-2213
@@ -15,6 +15,7 @@ upstream: released (5.2-rc6) [a370003cc301d4361bae20c9ef615f89bf8d1e8a]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "not used in Android"
sid: released (5.2.6-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.67-1)
4.9-stretch-security: needed
3.16-jessie-security: ignored "Android drivers not supported"
diff --git a/active/CVE-2019-9245 b/active/CVE-2019-9245
index 6081f372..c674330b 100644
--- a/active/CVE-2019-9245
+++ b/active/CVE-2019-9245
@@ -9,6 +9,7 @@ upstream: released (5.0-rc1) [64beba0558fce7b59e9a8a7afd77290e82a22163]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "f2fs is not supportable"
sid: released (4.19.16-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: ignored "f2fs is not supportable"
3.16-jessie-security: ignored "f2fs is not supportable"
diff --git a/active/CVE-2019-9453 b/active/CVE-2019-9453
index da1f50c0..e1fa0174 100644
--- a/active/CVE-2019-9453
+++ b/active/CVE-2019-9453
@@ -10,6 +10,7 @@ upstream: released (5.2-rc1) [2777e654371dd4207a3a7f4fb5fa39550053a080]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "f2fs is not supportable"
sid: released (5.2.6-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.67-1)
4.9-stretch-security: ignored "f2fs is not supportable"
3.16-jessie-security: ignored "f2fs is not supportable"
diff --git a/active/CVE-2019-kvm-guest-xcr0 b/active/CVE-2019-kvm-guest-xcr0
index 0afd0eae..0b9b33fd 100644
--- a/active/CVE-2019-kvm-guest-xcr0
+++ b/active/CVE-2019-kvm-guest-xcr0
@@ -15,6 +15,7 @@ upstream: released (5.1-rc6) [1811d979c71621aafc7b879477202d286f7e863b]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "EOL"
sid: released (5.2.6-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.87-1)
4.9-stretch-security: needed
3.16-jessie-security: ignored "EOL"
diff --git a/active/CVE-2020-0030 b/active/CVE-2020-0030
index 47dfb2a2..c22f65dc 100644
--- a/active/CVE-2020-0030
+++ b/active/CVE-2020-0030
@@ -15,6 +15,7 @@ upstream: released (4.16-rc3) [5eeb2ca02a2f6084fc57ae5c244a38baab07033a]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "Too difficult and risky to backport"
sid: released (4.15.11-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: N/A "Fixed before branching point"
4.9-stretch-security: ignored "binder not enabled, and risky to backport"
3.16-jessie-security: ignored "binder not enabled, and risky to backport"
diff --git a/active/CVE-2020-0067 b/active/CVE-2020-0067
index eed125d3..2c83195f 100644
--- a/active/CVE-2020-0067
+++ b/active/CVE-2020-0067
@@ -9,6 +9,7 @@ upstream: released (5.5-rc1) [688078e7f36c293dae25b338ddc9e0a2790f6e06]
4.9-upstream-stable: needed
3.16-upstream-stable: ignored "f2fs is not supportable"
sid: released (5.5.13-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.118-1) [bugfix/all/f2fs-fix-to-avoid-memory-leakage-in-f2fs_listxattr.patch]
4.9-stretch-security: ignored "f2fs is not supportable"
3.16-jessie-security: ignored "f2fs is not supportable"
diff --git a/active/CVE-2020-16120 b/active/CVE-2020-16120
index d1874b4f..ecdcf75d 100644
--- a/active/CVE-2020-16120
+++ b/active/CVE-2020-16120
@@ -20,5 +20,6 @@ upstream: released (5.8-rc1) [48bd024b8a40d73ad6b086de2615738da0c7004f, 56230d95
4.19-upstream-stable: N/A "Vulnerable configuration not possible"
4.9-upstream-stable: N/A "Vulnerable configuration not possible"
sid: released (5.8.7-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: N/A "Vulnerable configuration not possible"
diff --git a/active/CVE-2020-26141 b/active/CVE-2020-26141
index 67f050b0..24ed6a0b 100644
--- a/active/CVE-2020-26141
+++ b/active/CVE-2020-26141
@@ -11,5 +11,6 @@ upstream: released (5.13-rc4) [0dc267b13f3a7e8424a898815dd357211b737330]
4.19-upstream-stable: needed
4.9-upstream-stable:
sid: released (5.10.46-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security:
diff --git a/active/CVE-2020-26145 b/active/CVE-2020-26145
index cd077247..9ff4d5be 100644
--- a/active/CVE-2020-26145
+++ b/active/CVE-2020-26145
@@ -12,5 +12,6 @@ upstream: released (5.13-rc4) [65c415a144ad8132b6a6d97d4a1919ffc728e2d1, 40e7462
4.19-upstream-stable:
4.9-upstream-stable:
sid: released (5.10.46-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security:
4.9-stretch-security:
diff --git a/active/CVE-2020-27835 b/active/CVE-2020-27835
index 0a30d2a5..7057197d 100644
--- a/active/CVE-2020-27835
+++ b/active/CVE-2020-27835
@@ -9,5 +9,6 @@ upstream: released (5.10-rc6) [3d2a9d642512c21a12d19b9250e7a835dcb41a79]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
sid: released (5.9.15-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2020-29374 b/active/CVE-2020-29374
index 9b44ca1f..95e1dc34 100644
--- a/active/CVE-2020-29374
+++ b/active/CVE-2020-29374
@@ -10,5 +10,6 @@ upstream: released (5.8-rc1) [17839856fd588f4ab6b789f482ed3ffd7c403e1f]
4.19-upstream-stable: released (4.19.189) [5e24029791e809d641e9ea46a1f99806484e53fc]
4.9-upstream-stable: needed
sid: released (5.7.6-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.194-1)
4.9-stretch-security: released (4.9.272-1) [bugfix/all/gup-document-and-work-around-cow-can-break-either-wa.patch]
diff --git a/active/CVE-2020-36310 b/active/CVE-2020-36310
index 3b89932c..f61db03c 100644
--- a/active/CVE-2020-36310
+++ b/active/CVE-2020-36310
@@ -10,5 +10,6 @@ upstream: released (5.8-rc1) [e72436bc3a5206f95bb384e741154166ddb3202e]
4.19-upstream-stable: needed
4.9-upstream-stable: N/A "Vulnerability introduced later"
sid: released (5.8.7-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: N/A "Vulnerability introduced later"
diff --git a/active/CVE-2020-36322 b/active/CVE-2020-36322
index 93c9e6f7..21084948 100644
--- a/active/CVE-2020-36322
+++ b/active/CVE-2020-36322
@@ -11,5 +11,6 @@ upstream: released (5.11-rc1) [5d069dbe8aaf2a197142558b6fb2978189ba3454]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
sid: released (5.10.9-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: released (4.9.272-1) [bugfix/all/fuse-fix-bad-inode.patch]
diff --git a/active/CVE-2020-36385 b/active/CVE-2020-36385
index 0f50bbcf..1d1f016c 100644
--- a/active/CVE-2020-36385
+++ b/active/CVE-2020-36385
@@ -9,5 +9,6 @@ upstream: released (5.10-rc1) [f5449e74802c1112dea984aec8af7a33c4516af1]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
sid: released (5.10.4-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2021-20292 b/active/CVE-2021-20292
index 3ba0569b..7b6614f8 100644
--- a/active/CVE-2021-20292
+++ b/active/CVE-2021-20292
@@ -14,5 +14,6 @@ upstream: released (5.9-rc1) [5de5b6ecf97a021f29403aa272cb4e03318ef586]
4.19-upstream-stable: released (4.19.140) [10c8a526b2db1fcdf9e2d59d4885377b91939c55]
4.9-upstream-stable: needed
sid: released (5.7.17-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.146-1)
4.9-stretch-security: released (4.9.272-1) [bugfix/all/drm-ttm-nouveau-don-t-call-tt-destroy-callback-on-al.patch]
diff --git a/active/CVE-2021-22543 b/active/CVE-2021-22543
index 66c2ad35..3c7f043b 100644
--- a/active/CVE-2021-22543
+++ b/active/CVE-2021-22543
@@ -9,5 +9,6 @@ upstream: released (5.13) [f8be156be163a052a067306417cd0ff679068c97]
4.19-upstream-stable: released (4.19.199) [117777467bc015f0dc5fc079eeba0fa80c965149]
4.9-upstream-stable: needed
sid: released (5.10.46-2) [bugfix/all/KVM-do-not-allow-mapping-valid-but-non-reference-cou.patch]
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2021-28950 b/active/CVE-2021-28950
index 333d46d2..77319caf 100644
--- a/active/CVE-2021-28950
+++ b/active/CVE-2021-28950
@@ -13,5 +13,6 @@ upstream: released (5.12-rc4) [775c5033a0d164622d9d10dd0f0a5531639ed3ed]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
sid: released (5.10.24-1) [bugfix/all/fuse-fix-live-lock-in-fuse_iget.patch]
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: released (4.9.272-1) [bugfix/all/fuse-fix-live-lock-in-fuse_iget.patch]
diff --git a/active/CVE-2021-29264 b/active/CVE-2021-29264
index 381277d4..625d2bab 100644
--- a/active/CVE-2021-29264
+++ b/active/CVE-2021-29264
@@ -10,5 +10,6 @@ upstream: released (5.12-rc3) [d8861bab48b6c1fc3cdbcab8ff9d1eaea43afe7f]
4.19-upstream-stable: released (4.19.184) [9943741c2792a7f1d091aad38f496ed6eb7681c4]
4.9-upstream-stable: needed
sid: released (5.10.28-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.194-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-33033 b/active/CVE-2021-33033
index 8a84777c..81a9e57c 100644
--- a/active/CVE-2021-33033
+++ b/active/CVE-2021-33033
@@ -17,5 +17,6 @@ upstream: released (5.12-rc7) [ad5d07f4a9cd671233ae20983848874731102c08]
4.19-upstream-stable: released (4.19.181) [a44af1c69737f9e64d5134c34eb9d5c4c2e04da1]
4.9-upstream-stable: needed
sid: released (5.10.24-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.181-1)
4.9-stretch-security: needed
diff --git a/active/CVE-2021-33624 b/active/CVE-2021-33624
index 90132c17..7444d940 100644
--- a/active/CVE-2021-33624
+++ b/active/CVE-2021-33624
@@ -10,5 +10,6 @@ upstream: released (5.13-rc7) [d203b0fd863a2261e5d00b97f3d060c4c2a6db71, fe9a5ca
4.19-upstream-stable: needed
4.9-upstream-stable: needed
sid: released (5.10.46-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2021-3444 b/active/CVE-2021-3444
index e42fdd4f..7dd42300 100644
--- a/active/CVE-2021-3444
+++ b/active/CVE-2021-3444
@@ -18,5 +18,6 @@ upstream: released (5.12-rc1) [9b00f1b78809309163dda2d044d9e94a3c0248a3]
4.19-upstream-stable: needed
4.9-upstream-stable: N/A "Vulnerable code introduced later"
sid: released (5.10.19-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: N/A "Vulnerable code introduced later"
diff --git a/active/CVE-2021-34556 b/active/CVE-2021-34556
index f361b00e..67518656 100644
--- a/active/CVE-2021-34556
+++ b/active/CVE-2021-34556
@@ -8,5 +8,6 @@ upstream: released (5.14-rc4) [f5e81d1117501546b7be050c5fbafa6efd2c722c, 2039f26
4.19-upstream-stable:
4.9-upstream-stable:
sid: released (5.10.46-4) [bugfix/all/bpf-introduce-bpf-nospec-instruction-for-mitigating-.patch, bugfix/all/bpf-fix-leakage-due-to-insufficient-speculative-stor.patch]
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security:
4.9-stretch-security:
diff --git a/active/CVE-2021-3493 b/active/CVE-2021-3493
index 9cbc79c7..920ef556 100644
--- a/active/CVE-2021-3493
+++ b/active/CVE-2021-3493
@@ -14,5 +14,6 @@ upstream: released (5.11-rc1) [7c03e2cda4a584cadc398e8f6641ca9988a39d52]
4.19-upstream-stable: needed
4.9-upstream-stable: N/A "Unprivileged users cannot mount overlayfs"
sid: released (5.10.38-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: N/A "Unprivileged users cannot mount overlayfs"
diff --git a/active/CVE-2021-3506 b/active/CVE-2021-3506
index a9086327..5748f4e4 100644
--- a/active/CVE-2021-3506
+++ b/active/CVE-2021-3506
@@ -11,5 +11,6 @@ upstream: released (5.13-rc1) [b862676e371715456c9dade7990c8004996d0d9e]
4.19-upstream-stable: released (4.19.191) [bfa08a47cea2a9fab077c7135b9cfdf04e69c67a]
4.9-upstream-stable: needed
sid: released (5.10.38-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: released (4.19.194-1)
4.9-stretch-security: ignored "f2fs is not supportable"
diff --git a/active/CVE-2021-35477 b/active/CVE-2021-35477
index f361b00e..67518656 100644
--- a/active/CVE-2021-35477
+++ b/active/CVE-2021-35477
@@ -8,5 +8,6 @@ upstream: released (5.14-rc4) [f5e81d1117501546b7be050c5fbafa6efd2c722c, 2039f26
4.19-upstream-stable:
4.9-upstream-stable:
sid: released (5.10.46-4) [bugfix/all/bpf-introduce-bpf-nospec-instruction-for-mitigating-.patch, bugfix/all/bpf-fix-leakage-due-to-insufficient-speculative-stor.patch]
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security:
4.9-stretch-security:
diff --git a/active/CVE-2021-3600 b/active/CVE-2021-3600
index 2ad30987..523b98e4 100644
--- a/active/CVE-2021-3600
+++ b/active/CVE-2021-3600
@@ -12,5 +12,6 @@ upstream: released (5.11) [e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
sid: released (5.10.19-1)
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: needed
diff --git a/active/CVE-2021-3612 b/active/CVE-2021-3612
index cef46f4a..b316ce3c 100644
--- a/active/CVE-2021-3612
+++ b/active/CVE-2021-3612
@@ -14,5 +14,6 @@ upstream: released (5.14-rc1) [f8f84af5da9ee04ef1d271528656dac42a090d00]
4.19-upstream-stable: released (4.19.198) [b62ce8e3f7fbd81ea7c9341ac5e0d445f685f6af]
4.9-upstream-stable: released (4.9.276) [f3673f6f63db2aa08c35e707a2fdcbcc6590c391]
sid: released (5.10.46-3) [bugfix/all/Input-joydev-prevent-use-of-not-validated-data-in-JS.patch]
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: pending (4.9.276-1)
diff --git a/active/CVE-2021-3655 b/active/CVE-2021-3655
index fe308e3f..1eccf90b 100644
--- a/active/CVE-2021-3655
+++ b/active/CVE-2021-3655
@@ -9,5 +9,6 @@ upstream: released (5.14-rc1) [0c5dc070ff3d6246d22ddd931f23a6266249e3db, 50619db
4.19-upstream-stable: released (4.19.198) [c7a03ebace4f9cd40d9cd9dd5fb2af558025583c, dd16e38e1531258d332b0fc7c247367f60c6c381]
4.9-upstream-stable: released (4.9.276) [c7da1d1ed43a6c2bece0d287e2415adf2868697e]
sid: released (5.10.46-3) [bugfix/all/sctp-validate-from_addr_param-return.patch, bugfix/all/sctp-add-size-validation-when-walking-chunks.patch]
+5.10-bullseye-security: N/A "Fixed before branching point"
4.19-buster-security: needed
4.9-stretch-security: pending (4.9.276-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy