[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250729081824.85105-3-shung-hsi.yu@suse.com>
Date: Tue, 29 Jul 2025 16:18:24 +0800
From: Shung-Hsi Yu <shung-hsi.yu@...e.com>
To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
cve@...nel.org
Cc: LKML <linux-kernel@...r.kernel.org>,
Michal Hocko <mhocko@...e.com>,
João Póvoas <joao.povoas@...e.com>,
Shung-Hsi Yu <shung-hsi.yu@...e.com>,
Tao Lyu <tao.lyu@...l.ch>
Subject: [PATCH vulns 3/3] add a .vulnerable id for CVE-2023-52920
This commit is not necessarily where the issues were actually
introduced, but given backtracking is required for BPF verifier to be
mislead to prune an unsafe execution path, this is a lower barrier to
denote that no older versions can be affected.
Cc: Tao Lyu <tao.lyu@...l.ch>
Signed-off-by: Shung-Hsi Yu <shung-hsi.yu@...e.com>
---
cve/published/2023/CVE-2023-52920.vulnerable | 1 +
1 file changed, 1 insertion(+)
create mode 100644 cve/published/2023/CVE-2023-52920.vulnerable
diff --git a/cve/published/2023/CVE-2023-52920.vulnerable b/cve/published/2023/CVE-2023-52920.vulnerable
new file mode 100644
index 000000000..bc723ccd5
--- /dev/null
+++ b/cve/published/2023/CVE-2023-52920.vulnerable
@@ -0,0 +1 @@
+b5dc0163d8fd78e64a7e21f309cf932fda34353e
--
2.50.1
Powered by blists - more mailing lists