diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2022-12-14 16:24:20 +0100 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2022-12-14 16:24:20 +0100 |
commit | c2059b5e8e94ce4312c92bcb721c0dc2acbeb41e (patch) | |
tree | 4309330948116812ad46c88abe57ed3dab87d3da /active/CVE-2021-3506 | |
parent | f5463e27743e8f78246d3aa39d4db8a4b5e8dfba (diff) |
retire issues
Diffstat (limited to 'active/CVE-2021-3506')
-rw-r--r-- | active/CVE-2021-3506 | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/active/CVE-2021-3506 b/active/CVE-2021-3506 deleted file mode 100644 index 5748f4e4..00000000 --- a/active/CVE-2021-3506 +++ /dev/null @@ -1,16 +0,0 @@ -Description: Out of bounds memory access bug in get_next_net_page() in fs/f2fs/node.c -References: - https://www.openwall.com/lists/oss-security/2021/03/28/2 - https://bugzilla.redhat.com/show_bug.cgi?id=1944298 - https://lore.kernel.org/lkml/20210322114730.71103-1-yuchao0@huawei.com/ -Notes: - bwh> Appears to have been introduced before 4.9. -Bugs: -upstream: released (5.13-rc1) [b862676e371715456c9dade7990c8004996d0d9e] -5.10-upstream-stable: released (5.10.36) [9aa4602237d535b83c579eb752e8fc1c3e7e7055] -4.19-upstream-stable: released (4.19.191) [bfa08a47cea2a9fab077c7135b9cfdf04e69c67a] -4.9-upstream-stable: needed -sid: released (5.10.38-1) -5.10-bullseye-security: N/A "Fixed before branching point" -4.19-buster-security: released (4.19.194-1) -4.9-stretch-security: ignored "f2fs is not supportable" |