diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2022-12-14 16:45:42 +0100 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2022-12-14 16:45:42 +0100 |
commit | b9a091d612e318a061371b5526c604ab0706eba3 (patch) | |
tree | 4d31b819ae96c4b4806e08df6cb4b2c8d440caba /retired/CVE-2022-0171 | |
parent | c2059b5e8e94ce4312c92bcb721c0dc2acbeb41e (diff) |
retire more issues
Diffstat (limited to 'retired/CVE-2022-0171')
-rw-r--r-- | retired/CVE-2022-0171 | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/retired/CVE-2022-0171 b/retired/CVE-2022-0171 new file mode 100644 index 00000000..d9d1a855 --- /dev/null +++ b/retired/CVE-2022-0171 @@ -0,0 +1,17 @@ +Description: KVM: cache incoherence issue in SEV API may lead to kernel crash +References: + https://bugzilla.redhat.com/show_bug.cgi?id=2038940 + https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bb4ce2c65881a2b9bdcd384f54a260a12a89dd91 + https://bugzilla.suse.com/show_bug.cgi?id=1199509 +Notes: + carnil> Need to isolate the required commits from the merge which are + carnil> relevant for the CVE. +Bugs: +upstream: released (5.18-rc4) [683412ccf61294d727ead4a73d97397396e69a6b] +5.10-upstream-stable: released (5.10.146) [a60babeb60ff276963d4756c7fd2e7bf242bb777] +4.19-upstream-stable: N/A "Vulnerable code not present" +4.9-upstream-stable: N/A "Vulnerable code not present" +sid: released (5.18.2-1) +5.10-bullseye-security: released (5.10.148-1) +4.19-buster-security: N/A "Vulnerable code not present" +4.9-stretch-security: N/A "Vulnerable code not present" |