summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-3506
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2022-12-14 16:24:20 +0100
committerMoritz Muehlenhoff <jmm@debian.org>2022-12-14 16:24:20 +0100
commitc2059b5e8e94ce4312c92bcb721c0dc2acbeb41e (patch)
tree4309330948116812ad46c88abe57ed3dab87d3da /active/CVE-2021-3506
parentf5463e27743e8f78246d3aa39d4db8a4b5e8dfba (diff)
retire issues
Diffstat (limited to 'active/CVE-2021-3506')
-rw-r--r--active/CVE-2021-350616
1 files changed, 0 insertions, 16 deletions
diff --git a/active/CVE-2021-3506 b/active/CVE-2021-3506
deleted file mode 100644
index 5748f4e4..00000000
--- a/active/CVE-2021-3506
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: Out of bounds memory access bug in get_next_net_page() in fs/f2fs/node.c
-References:
- https://www.openwall.com/lists/oss-security/2021/03/28/2
- https://bugzilla.redhat.com/show_bug.cgi?id=1944298
- https://lore.kernel.org/lkml/20210322114730.71103-1-yuchao0@huawei.com/
-Notes:
- bwh> Appears to have been introduced before 4.9.
-Bugs:
-upstream: released (5.13-rc1) [b862676e371715456c9dade7990c8004996d0d9e]
-5.10-upstream-stable: released (5.10.36) [9aa4602237d535b83c579eb752e8fc1c3e7e7055]
-4.19-upstream-stable: released (4.19.191) [bfa08a47cea2a9fab077c7135b9cfdf04e69c67a]
-4.9-upstream-stable: needed
-sid: released (5.10.38-1)
-5.10-bullseye-security: N/A "Fixed before branching point"
-4.19-buster-security: released (4.19.194-1)
-4.9-stretch-security: ignored "f2fs is not supportable"

© 2014-2024 Faster IT GmbH | imprint | privacy policy