summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2022-0516
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-03-25 20:49:54 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2022-03-25 20:49:54 +0100
commit799d3c586b6df4d41fccd5fc2ff796a087c26329 (patch)
tree58859fea1691e870e5406a47cbb0c08c1e4582e6 /retired/CVE-2022-0516
parente3e90ffdadf6bb9b0e7ff277a38879d594f49edd (diff)
Retire several CVEs
Diffstat (limited to 'retired/CVE-2022-0516')
-rw-r--r--retired/CVE-2022-051617
1 files changed, 17 insertions, 0 deletions
diff --git a/retired/CVE-2022-0516 b/retired/CVE-2022-0516
new file mode 100644
index 00000000..51685098
--- /dev/null
+++ b/retired/CVE-2022-0516
@@ -0,0 +1,17 @@
+Description: KVM: s390: Return error on SIDA memop on normal guest
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=2050237
+ https://www.openwall.com/lists/oss-security/2022/02/11/2
+Notes:
+ carnil> Introduced by 19e122776886 (KVM: S390: protvirt: Introduce
+ carnil> instruction data area bounce buffer) in 5.7-rc1
+ carnil> Fixed as well in 5.16.9 for 5.16.y.
+Bugs:
+upstream: released (5.17-rc4) [2c212e1baedcd782b2535a3f86bc491977677c0e]
+5.10-upstream-stable: released (5.10.100) [b62267b8b06e9b8bb429ae8f962ee431e6535d60]
+4.19-upstream-stable: N/A "Vulnerable code not present"
+4.9-upstream-stable: N/A "Vulnerable code not present"
+sid: released (5.16.10-1)
+5.10-bullseye-security: released (5.10.92-2) [bugfix/s390x/KVM-s390-Return-error-on-SIDA-memop-on-normal-guest.patch]
+4.19-buster-security: N/A "Vulnerable code not present"
+4.9-stretch-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy