summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-01-16 09:37:43 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2022-01-16 09:37:43 +0100
commit544d685333feb16645a4190f3e9a0c389d6d5691 (patch)
tree63ad67f2c86ca54cede0559582659b2120827cbe
parent1e67b86cd97fb5ccdbe0b990e660bb9dd51c9fec (diff)
Update status for CVE-2022-23222 (released in 5.16.1, 5.15.15 and 5.10.92)
-rw-r--r--active/CVE-2022-232223
1 files changed, 2 insertions, 1 deletions
diff --git a/active/CVE-2022-23222 b/active/CVE-2022-23222
index 4b9d3bd0..e16c05c8 100644
--- a/active/CVE-2022-23222
+++ b/active/CVE-2022-23222
@@ -7,9 +7,10 @@ Notes:
carnil> verification" was backported for fixing the issue as the issue
carnil> was fixed in mainline through the larger refactoring in
carnil> c25b2ae136039ffa820c26138ed4a5e5f3ab3841.
+ carnil> Fixed as well in 5.16.1 for 5.16.y, 5.15.15 for 5.15.y.
Bugs:
upstream: pending [c25b2ae136039ffa820c26138ed4a5e5f3ab3841]
-5.10-upstream-stable: needed
+5.10-upstream-stable: released (5.10.92) [35ab8c9085b0af847df7fac9571ccd26d9f0f513]
4.19-upstream-stable: N/A "Vulnerable code not present"
4.9-upstream-stable: N/A "Vulnerable code not present"
sid: pending (5.15.14-1) [bugfix/all/bpf-fix-out-of-bounds-access-from-invalid-_or_null-type-verification.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy