diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2022-06-22 16:49:35 +0200 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2022-06-22 16:49:35 +0200 |
commit | 28d6c9b246a38f25c45f9868002d49dfb9735f98 (patch) | |
tree | e50de194f01fa66cc32b60fdb31df49c1442dfcd | |
parent | aad0492555a7fda8d145afaa4c10bdd7faca83e0 (diff) |
Update information for CVE-2022-0400
-rw-r--r-- | active/CVE-2022-0400 | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/active/CVE-2022-0400 b/active/CVE-2022-0400 index c0082386..ae6d1b98 100644 --- a/active/CVE-2022-0400 +++ b/active/CVE-2022-0400 @@ -2,8 +2,11 @@ Description: Out of bounds read in the smc protocol stack References: https://bugzilla.redhat.com/show_bug.cgi?id=2044575 https://bugzilla.redhat.com/show_bug.cgi?id=2040604 + https://bugzilla.suse.com/show_bug.cgi?id=1195329 Notes: bwh> The smc protocol was added in 4.11. + carnil> SUSE folks suspect this is actually a non-issue, see + carnil> https://bugzilla.suse.com/show_bug.cgi?id=1195329#c7 Bugs: upstream: 5.10-upstream-stable: |