blob: b0fbc14cb5b4eaf4c03ac3d2c88e44bf5f8d7094 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
|
Description: ARM: footbridge: array overrun issue
References:
https://kirtikumarar.com/CVE-2021-32078.txt
Notes:
carnil> Issue is in the "personal server platform", which is not
carnil> enabled in Debian. Furthermore the fixing commit just removes
carnil> the whole code, which is believed that no one is using it.
bwh> The affected platform has a StrongArm (ARM v4) CPU which was only
bwh> supported by Debian's original arm architecture, not armel
Bugs:
upstream: released (5.13-rc1) [298a58e165e447ccfaae35fe9f651f9d7e15166f]
5.10-upstream-stable:
4.19-upstream-stable:
4.9-upstream-stable:
sid: released (5.14.6-1)
5.10-bullseye-security: ignored "Not applicable to any Debian architecture"
4.19-buster-security: ignored "Not applicable to any Debian architecture"
4.9-stretch-security: ignored "Not applicable to any Debian architecture"
|