summaryrefslogtreecommitdiffstats
path: root/active/CVE-2023-4194
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-08-11 17:32:20 +0200
committerSalvatore Bonaccorso <carnil@debian.org>2023-08-11 17:32:20 +0200
commitd962cad3092a341818d929dd3909d01e496a9833 (patch)
tree821e003433362f913b9a2741f9b9d20709d8fa29 /active/CVE-2023-4194
parent078368e6642129d6f164406fc65ea536f3914288 (diff)
Track fixes in 4.19.291, 5.10.190, 6.1.45 and 6.4.10
Diffstat (limited to 'active/CVE-2023-4194')
-rw-r--r--active/CVE-2023-41945
1 files changed, 3 insertions, 2 deletions
diff --git a/active/CVE-2023-4194 b/active/CVE-2023-4194
index 42adef68..ddf9fdf8 100644
--- a/active/CVE-2023-4194
+++ b/active/CVE-2023-4194
@@ -6,10 +6,11 @@ References:
https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/
Notes:
carnil> CVE exists because of incorrect fixes for CVE-2023-1076.
+ carnil> For 6.4.y fixed as well in 6.4.10.
Bugs:
upstream: released (6.5-rc5) [9bc3047374d5bec163e83e743709e23753376f0c, 5c9241f3ceab3257abe2923a59950db0dc8bb737]
-6.1-upstream-stable: needed
-5.10-upstream-stable: needed
+6.1-upstream-stable: released (6.1.45) [b6846d7c408b33e4701f4f5ca28932e2a08e0a2e. 767800fc402deac438c5aed9c82f0e71a70c86fd]
+5.10-upstream-stable: released (5.10.190) [5ea23f1cb67e4468db7ff651627892c9217fec24, 33a339e717be2c88b7ad11375165168d5b40e38e]
4.19-upstream-stable: needed
sid: needed
6.1-bookworm-security: needed

© 2014-2024 Faster IT GmbH | imprint | privacy policy