summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-06-22 16:49:35 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2022-06-22 16:49:35 +0200
commit28d6c9b246a38f25c45f9868002d49dfb9735f98 (patch)
treee50de194f01fa66cc32b60fdb31df49c1442dfcd
parentaad0492555a7fda8d145afaa4c10bdd7faca83e0 (diff)
Update information for CVE-2022-0400
-rw-r--r--active/CVE-2022-04003
1 files changed, 3 insertions, 0 deletions
diff --git a/active/CVE-2022-0400 b/active/CVE-2022-0400
index c0082386..ae6d1b98 100644
--- a/active/CVE-2022-0400
+++ b/active/CVE-2022-0400
@@ -2,8 +2,11 @@ Description: Out of bounds read in the smc protocol stack
References:
https://bugzilla.redhat.com/show_bug.cgi?id=2044575
https://bugzilla.redhat.com/show_bug.cgi?id=2040604
+ https://bugzilla.suse.com/show_bug.cgi?id=1195329
Notes:
bwh> The smc protocol was added in 4.11.
+ carnil> SUSE folks suspect this is actually a non-issue, see
+ carnil> https://bugzilla.suse.com/show_bug.cgi?id=1195329#c7
Bugs:
upstream:
5.10-upstream-stable:

© 2014-2024 Faster IT GmbH | imprint | privacy policy