summaryrefslogtreecommitdiffstats
path: root/active/CVE-2022-43945
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2023-01-09 15:53:44 +0100
committerMoritz Muehlenhoff <jmm@debian.org>2023-01-09 15:53:44 +0100
commit4a83cbc17fb69da2d910823a3780a02c88e94563 (patch)
tree6c547aa2487d8adc3a2e7f90108ac731888c8b00 /active/CVE-2022-43945
parent1296941aebd962933d446ed710e83bdaaadc2e4a (diff)
add comment on CVE-2022-43945
Diffstat (limited to 'active/CVE-2022-43945')
-rw-r--r--active/CVE-2022-439451
1 files changed, 1 insertions, 0 deletions
diff --git a/active/CVE-2022-43945 b/active/CVE-2022-43945
index 6748cfad..8783be6d 100644
--- a/active/CVE-2022-43945
+++ b/active/CVE-2022-43945
@@ -7,6 +7,7 @@ Notes:
bwh> The affected code was changed in 5.12, 5.13, and 5.15.
bwh> It's not yet clear to me whether earlier versions are also
bwh> affected.
+ jmm> Per Neil Brown's comment at https://bugzilla.suse.com/show_bug.cgi?id=1205128#c4 older kernels are also affected
Bugs:
upstream: released (6.1-rc1) [00b4492686e0497fdb924a9d4c8f6f99377e176c, 640f87c190e0d1b2a0fcb2ecf6d2cd53b1c41991, 401bc1f90874280a80b93f23be33a0e7e2d1f912, fa6be9cc6e80ec79892ddf08a8c10cabab9baf38]
5.10-upstream-stable:

© 2014-2024 Faster IT GmbH | imprint | privacy policy