summaryrefslogtreecommitdiffstats
path: root/active/CVE-2024-23307
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2024-01-25 14:38:10 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2024-01-25 14:38:10 +0100
commit1962ac59d4adfe767c5780a2d4622b2d6d98a71e (patch)
treed377c75592c3b465463cd5cc070ddc06c40cbd27 /active/CVE-2024-23307
parente89e87fc4480bc51c761320f73a1b8eca3b02a83 (diff)
Add CVE-2024-23307
Diffstat (limited to 'active/CVE-2024-23307')
-rw-r--r--active/CVE-2024-2330719
1 files changed, 19 insertions, 0 deletions
diff --git a/active/CVE-2024-23307 b/active/CVE-2024-23307
new file mode 100644
index 000000000..d54d205cf
--- /dev/null
+++ b/active/CVE-2024-23307
@@ -0,0 +1,19 @@
+Description:
+References:
+ https://bugzilla.openanolis.cn/show_bug.cgi?id=7975
+Notes:
+ carnil> CVE description reads as "Integer Overflow or Wraparound
+ carnil> vulnerability in Linux Linux kernel kernel on Linux, x86, ARM
+ carnil> (md, raid, raid5 modules) allows Forced Integer Overflow."
+ carnil> which indicates together with the affected version (from v4.1-
+ carnil> rc1 before v6.8-rc1), that it is a upstream Linux kernel issue.
+ carnil> To date (2024-01-25) the OpenAnolis is restricted.
+Bugs:
+upstream:
+6.1-upstream-stable:
+5.10-upstream-stable:
+4.19-upstream-stable:
+sid:
+6.1-bookworm-security:
+5.10-bullseye-security:
+4.19-buster-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy