diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2024-01-25 14:38:10 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2024-01-25 14:38:10 +0100 |
commit | 1962ac59d4adfe767c5780a2d4622b2d6d98a71e (patch) | |
tree | d377c75592c3b465463cd5cc070ddc06c40cbd27 /active/CVE-2024-23307 | |
parent | e89e87fc4480bc51c761320f73a1b8eca3b02a83 (diff) |
Add CVE-2024-23307
Diffstat (limited to 'active/CVE-2024-23307')
-rw-r--r-- | active/CVE-2024-23307 | 19 |
1 files changed, 19 insertions, 0 deletions
diff --git a/active/CVE-2024-23307 b/active/CVE-2024-23307 new file mode 100644 index 000000000..d54d205cf --- /dev/null +++ b/active/CVE-2024-23307 @@ -0,0 +1,19 @@ +Description: +References: + https://bugzilla.openanolis.cn/show_bug.cgi?id=7975 +Notes: + carnil> CVE description reads as "Integer Overflow or Wraparound + carnil> vulnerability in Linux Linux kernel kernel on Linux, x86, ARM + carnil> (md, raid, raid5 modules) allows Forced Integer Overflow." + carnil> which indicates together with the affected version (from v4.1- + carnil> rc1 before v6.8-rc1), that it is a upstream Linux kernel issue. + carnil> To date (2024-01-25) the OpenAnolis is restricted. +Bugs: +upstream: +6.1-upstream-stable: +5.10-upstream-stable: +4.19-upstream-stable: +sid: +6.1-bookworm-security: +5.10-bullseye-security: +4.19-buster-security: |