summaryrefslogtreecommitdiffstats
path: root/retired
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2023-12-08 09:43:42 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2023-12-08 09:44:33 +0100
commit290e2ab75622f7dce22a916205c9a4ea81cc3266 (patch)
tree170a446d47f1f07200752bea11dfd952c7ea94a1 /retired
parent45641017d9cd9fa54b117e8181d90936427c9f58 (diff)
Move CVE-2023-25775 to needed state for older suites
Unclear why the ocmmit was backported as well to 5.10.203 and 4.19.301 but to be on the safe side consider the CVE affecting all stable series way back to those.
Diffstat (limited to 'retired')
-rw-r--r--retired/CVE-2023-2577516
1 files changed, 0 insertions, 16 deletions
diff --git a/retired/CVE-2023-25775 b/retired/CVE-2023-25775
deleted file mode 100644
index ed97de66..00000000
--- a/retired/CVE-2023-25775
+++ /dev/null
@@ -1,16 +0,0 @@
-Description: RDMA/irdma: Prevent zero-length STAG registration
-References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html
-Notes:
- carnil> Commit fixes b48c24c2d710 ("RDMA/irdma: Implement device
- carnil> supported verb APIs") in 5.14-rc1.
- carnil> Fixed as well in 6.4.16 for 6.4.y and in 6.5.3 for 6.5.y.
-Bugs:
-upstream: released (6.6-rc1) [bb6d73d9add68ad270888db327514384dfa44958]
-6.1-upstream-stable: released (6.1.53) [f01cfec8d3456bf389918eb898eda11f46d8b1b7]
-5.10-upstream-stable: N/A "Vulnerable code not present"
-4.19-upstream-stable: N/A "Vulnerable code not present"
-sid: released (6.5.3-1)
-6.1-bookworm-security: released (6.1.55-1)
-5.10-bullseye-security: N/A "Vulnerable code not present"
-4.19-buster-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy