summaryrefslogtreecommitdiffstats
path: root/active/CVE-2021-32078
blob: b0fbc14cb5b4eaf4c03ac3d2c88e44bf5f8d7094 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Description: ARM: footbridge: array overrun issue
References:
 https://kirtikumarar.com/CVE-2021-32078.txt
Notes:
 carnil> Issue is in the "personal server platform", which is not
 carnil> enabled in Debian. Furthermore the fixing commit just removes
 carnil> the whole code, which is believed that no one is using it.
 bwh> The affected platform has a StrongArm (ARM v4) CPU which was only
 bwh> supported by Debian's original arm architecture, not armel
Bugs:
upstream: released (5.13-rc1) [298a58e165e447ccfaae35fe9f651f9d7e15166f]
5.10-upstream-stable:
4.19-upstream-stable:
4.9-upstream-stable:
sid: released (5.14.6-1)
5.10-bullseye-security: ignored "Not applicable to any Debian architecture"
4.19-buster-security: ignored "Not applicable to any Debian architecture"
4.9-stretch-security: ignored "Not applicable to any Debian architecture"

© 2014-2024 Faster IT GmbH | imprint | privacy policy