summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2022-01-13 22:41:26 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2022-01-13 22:41:26 +0100
commitacb9ac528f970711d2ecd0a1827b59a7f5b44575 (patch)
treed90ededc4ae2b3c8da5a79e0ee664ffc89439233
parent48a64abf7be2e19f3a352cee4836a83a6b258a59 (diff)
Add tempoarary tracking for second bpf issue
-rw-r--r--active/CVE-2022-oob-invalid_OR_NULL-type-verification18
1 files changed, 18 insertions, 0 deletions
diff --git a/active/CVE-2022-oob-invalid_OR_NULL-type-verification b/active/CVE-2022-oob-invalid_OR_NULL-type-verification
new file mode 100644
index 00000000..b102da25
--- /dev/null
+++ b/active/CVE-2022-oob-invalid_OR_NULL-type-verification
@@ -0,0 +1,18 @@
+Description: bpf: Fix out of bounds access from invalid *_or_null type verification
+References:
+ https://www.openwall.com/lists/oss-security/2022/01/13/1
+Notes:
+ carnil> For stable series in 5.10.y, 5.15.y and 5.16.y the commit "bpf:
+ carnil> Fix out of bounds access from invalid *_or_null type
+ carnil> verification" was backported for fixing the issue as the issue
+ carnil> was fixed in mainline through the larger refactoring in
+ carnil> c25b2ae136039ffa820c26138ed4a5e5f3ab3841.
+Bugs:
+upstream: pending [c25b2ae136039ffa820c26138ed4a5e5f3ab3841]
+5.10-upstream-stable: needed
+4.19-upstream-stable: N/A "Vulnerable code not present"
+4.9-upstream-stable: N/A "Vulnerable code not present"
+sid: needed
+5.10-bullseye-security: needed
+4.19-buster-security: N/A "Vulnerable code not present"
+4.9-stretch-security: N/A "Vulnerable code not present"

© 2014-2024 Faster IT GmbH | imprint | privacy policy