summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2022-33741
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2022-12-14 17:18:36 +0100
committerMoritz Muehlenhoff <jmm@debian.org>2022-12-14 17:18:36 +0100
commit1595b8f518ac796fd6100c95a460d819dfdd21e8 (patch)
tree3e00fa0bd6dba26d86dc63e284232d6190224f94 /retired/CVE-2022-33741
parent076e33b11cfc62c1c654defb017643e6507b8a02 (diff)
retire issues
Diffstat (limited to 'retired/CVE-2022-33741')
-rw-r--r--retired/CVE-2022-3374112
1 files changed, 12 insertions, 0 deletions
diff --git a/retired/CVE-2022-33741 b/retired/CVE-2022-33741
new file mode 100644
index 00000000..1d9c2abc
--- /dev/null
+++ b/retired/CVE-2022-33741
@@ -0,0 +1,12 @@
+Description: Xen Linux disk/nic frontends data leaks
+References:
+ https://xenbits.xen.org/xsa/advisory-403.html
+Notes:
+ carnil> For 5.18.y fixed as well in 5.18.10.
+Bugs:
+upstream: released (5.19-rc6) [4491001c2e0fa69efbb748c96ec96b100a5cdb7e]
+5.10-upstream-stable: released (5.10.129) [4923217af5742a796821272ee03f8d6de15c0cca]
+4.19-upstream-stable: released (4.19.251) [4b67d8e42dbba42cfafe22ac3e4117d9573fdd74]
+sid: released (5.18.14-1)
+5.10-bullseye-security: released (5.10.127-2) [bugfix/all/xen-netfront-force-data-bouncing-when-backend-is-unt.patch]
+4.19-buster-security: released (4.19.260-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy