diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2022-12-14 15:33:27 +0100 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2022-12-14 15:33:27 +0100 |
commit | fa9e50dfa2ecfe80ee04035b55d36bf33555cb2f (patch) | |
tree | ab78ba97383bc1e4c5bc0d2e3a9174ab97156406 /retired/CVE-2018-25020 | |
parent | cfc5cef637a25d5c1d5c9b28932ff091f28754e5 (diff) |
retire issues
Diffstat (limited to 'retired/CVE-2018-25020')
-rw-r--r-- | retired/CVE-2018-25020 | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/retired/CVE-2018-25020 b/retired/CVE-2018-25020 new file mode 100644 index 00000000..0ed4a509 --- /dev/null +++ b/retired/CVE-2018-25020 @@ -0,0 +1,16 @@ +Description: bpf: fix truncated jump targets on heavy expansions +References: +Notes: + bwh> I'm not sure whether BPF in 4.9 can expand BPF programs enough + bwh> to trigger this bug, but I'd rather enforce that at run-time + bwh> than carry out an analyse which might be invalidated by later + bwh> changes. Therefore marking this as needed. +Bugs: +upstream: released (4.17-rc7) [050fad7c4534c13c8eb1d9c2ba66012e014773cb] +5.10-upstream-stable: N/A "Fixed before branching point" +4.19-upstream-stable: N/A "Fixed before branching point" +4.9-upstream-stable: needed +sid: released (4.17.3-1) +5.10-bullseye-security: N/A "Fixed before branching point" +4.19-buster-security: N/A "Fixed before branching point" +4.9-stretch-security: ignored "EOL" |