summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-3772
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2021-11-02 20:31:14 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2021-11-02 20:31:14 +0100
commit9603fb3d6ff81ea1839d543dc544b7bfee3f825c (patch)
treed5251b603e3de0d810b0bdc2b80798b52f1b147f /active/CVE-2021-3772
parent3e2a2fef09a762835da588eab6166198b57e558f (diff)
Track fixes in 5.10.77, 4.19.215 and 4.9.289
Diffstat (limited to 'active/CVE-2021-3772')
-rw-r--r--active/CVE-2021-37727
1 files changed, 4 insertions, 3 deletions
diff --git a/active/CVE-2021-3772 b/active/CVE-2021-3772
index a98a2f94..e3db7125 100644
--- a/active/CVE-2021-3772
+++ b/active/CVE-2021-3772
@@ -2,11 +2,12 @@ Description: Invalid chunks may be used to remotely remove existing associations
References:
https://bugzilla.redhat.com/show_bug.cgi?id=2000694
Notes:
+ carnil> Fixed as well in 5.14.16 for 5.14.y series.
Bugs:
upstream: released (5.15) [4f7019c7eb33967eb87766e0e4602b5576873680, eae5783908042a762c24e1bd11876edb91d314b1, 438b95a7c98f77d51cbf4db021f41b602d750a3f, a64b341b8695e1c744dd972b39868371b4f68f83, aa0f697e45286a6b5f0ceca9418acf54b9099d99, ef16b1734f0a176277b7bb9c71a6d977a6ef3998, 9d02831e517aa36ee6bdb453a0eb47bd49923fe3]
-5.10-upstream-stable: needed
-4.19-upstream-stable: needed
-4.9-upstream-stable: needed
+5.10-upstream-stable: released (5.10.77) [ad111d4435d85fd3eeb2c09692030d89f8862401, 8c50693d25e4ab6873b32bc3cea23b382a94d05f, dad2486414b5c81697aa5a24383fbb65fad13cae, 14c1e02b11c2233343573aff90766ef8472f27e7, c2442f721972ea7c317fbfd55c902616b3151ad5, a7112b8eeb14b3db21bc96abc79ca7525d77e129]
+4.19-upstream-stable: released (4.19.215) [1f52dfacca7bb315d89f5ece5660b0337809798e, 86044244fc6f9eaec0070cb668e0d500de22dbba, 7bf2f6a30d1851c530ad5e4ee7e5c45fb6be0128, d9a4f990aab48dd5c134a9e76c7b651d404b05d3, 1ff3c379248ea579aa122d4ca245028e4bc9af23]
+4.9-upstream-stable: released (4.9.289) [42ce7a69f8140783bab908dc29a93c0bcda315d5, 16d0bfb045abf587c72d46dfea56c20c4aeda927]
sid: needed
5.10-bullseye-security: needed
4.19-buster-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy