summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-06-22 16:50:03 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2022-06-22 16:50:03 +0200
commit0858c949bae9375fbaf43d13f4d1daf3444d5012 (patch)
treed26a47810f0950be0c03c3cd3efa76257433b482
parent28d6c9b246a38f25c45f9868002d49dfb9735f98 (diff)
Update information for CVE-2022-1184
-rw-r--r--active/CVE-2022-118421
1 files changed, 13 insertions, 8 deletions
diff --git a/active/CVE-2022-1184 b/active/CVE-2022-1184
index 6983c977..7da59f75 100644
--- a/active/CVE-2022-1184
+++ b/active/CVE-2022-1184
@@ -2,13 +2,18 @@ Description: use-after-free and memory errors in ext4 when mounting and operatin
References:
https://bugzilla.redhat.com/show_bug.cgi?id=2070205
https://lore.kernel.org/linux-ext4/20220428180355.15209-1-jack@suse.cz/T/#t
+ https://bugzilla.suse.com/show_bug.cgi?id=1198577
Notes:
+ carnil> Fixed as well in 5.17.14 for 5.17.y, 5.18.3 for 5.18.y.
+ carnil> Ben, pelase double check if you agree on the triage. It is
+ carnil> based on the additional information provided in the SUSE
+ carnil> bugzilla.
Bugs:
-upstream:
-5.10-upstream-stable:
-4.19-upstream-stable:
-4.9-upstream-stable:
-sid:
-5.10-bullseye-security:
-4.19-buster-security:
-4.9-stretch-security:
+upstream: released (5.19-rc1) [46c116b920ebec58031f0a78c5ea9599b0d2a371, 3ba733f879c2a88910744647e41edeefbc0d92b2]
+5.10-upstream-stable: released (5.10.121) [da2f05919238c7bdc6e28c79539f55c8355408bb, ff4cafa51762da3824881a9000ca421d4b78b138]
+4.19-upstream-stable: released (4.19.247) [78398c2b2cc14f9a9c8592cf6d334c5a479ed611, b3ad9ff6f06c1dc6abf7437691c88ca3d6da3ac0]
+4.9-upstream-stable: released (4.9.318) [93bbf0498ba20eadcd7132bd3cfdaff54eb72751]
+sid: released (5.18.5-1)
+5.10-bullseye-security: needed
+4.19-buster-security: needed
+4.9-stretch-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy