diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2023-12-08 09:43:42 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2023-12-08 09:44:33 +0100 |
commit | 290e2ab75622f7dce22a916205c9a4ea81cc3266 (patch) | |
tree | 170a446d47f1f07200752bea11dfd952c7ea94a1 /retired/CVE-2023-25775 | |
parent | 45641017d9cd9fa54b117e8181d90936427c9f58 (diff) |
Move CVE-2023-25775 to needed state for older suites
Unclear why the ocmmit was backported as well to 5.10.203 and 4.19.301
but to be on the safe side consider the CVE affecting all stable series
way back to those.
Diffstat (limited to 'retired/CVE-2023-25775')
-rw-r--r-- | retired/CVE-2023-25775 | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/retired/CVE-2023-25775 b/retired/CVE-2023-25775 deleted file mode 100644 index ed97de66..00000000 --- a/retired/CVE-2023-25775 +++ /dev/null @@ -1,16 +0,0 @@ -Description: RDMA/irdma: Prevent zero-length STAG registration -References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html -Notes: - carnil> Commit fixes b48c24c2d710 ("RDMA/irdma: Implement device - carnil> supported verb APIs") in 5.14-rc1. - carnil> Fixed as well in 6.4.16 for 6.4.y and in 6.5.3 for 6.5.y. -Bugs: -upstream: released (6.6-rc1) [bb6d73d9add68ad270888db327514384dfa44958] -6.1-upstream-stable: released (6.1.53) [f01cfec8d3456bf389918eb898eda11f46d8b1b7] -5.10-upstream-stable: N/A "Vulnerable code not present" -4.19-upstream-stable: N/A "Vulnerable code not present" -sid: released (6.5.3-1) -6.1-bookworm-security: released (6.1.55-1) -5.10-bullseye-security: N/A "Vulnerable code not present" -4.19-buster-security: N/A "Vulnerable code not present" |