From f9338861a68e27a29af17b07af37d31134e25cb4 Mon Sep 17 00:00:00 2001 From: Salvatore Bonaccorso Date: Thu, 20 Jan 2022 17:02:26 +0100 Subject: Track CVE-2021-4135 fix in bullseye Not mentioned in the DSA as it is unimportant, we do fix the issue on source level but it does not affect the kernel builds in Debian as we do not set CONFIG_NETDEVSIM. --- data/CVE/2021.list | 1 + 1 file changed, 1 insertion(+) diff --git a/data/CVE/2021.list b/data/CVE/2021.list index a0164e4e98..bceca1082d 100644 --- a/data/CVE/2021.list +++ b/data/CVE/2021.list @@ -3181,6 +3181,7 @@ CVE-2021-4136 (vim is vulnerable to Heap-based Buffer Overflow ...) CVE-2021-4135 RESERVED - linux 5.15.15-1 (unimportant) + [bullseye] - linux 5.10.92-1 [stretch] - linux (Vulnerable code not present) NOTE: https://git.kernel.org/linus/481221775d53d6215a6e5e9ce1cce6d2b4ab9a46 (5.16-rc6) NOTE: CONFIG_NETDEVSIM is not set in Debian -- cgit v1.2.3