diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2022-03-25 15:45:47 +0100 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2022-03-25 15:45:47 +0100 |
commit | f01f9907393d88ce9f869bfe8256f53c8e5b90da (patch) | |
tree | a92f4d31c07eebaa836e4d1436dfbbc15d31c2f3 /retired/CVE-2022-0742 | |
parent | 397449be43725e89574277c5e51e32fb16c087c6 (diff) |
retire CVE-2022-0742
Diffstat (limited to 'retired/CVE-2022-0742')
-rw-r--r-- | retired/CVE-2022-0742 | 22 |
1 files changed, 22 insertions, 0 deletions
diff --git a/retired/CVE-2022-0742 b/retired/CVE-2022-0742 new file mode 100644 index 00000000..1455c1bc --- /dev/null +++ b/retired/CVE-2022-0742 @@ -0,0 +1,22 @@ +Description: ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report() +References: + https://bugzilla.redhat.com/show_bug.cgi?id=2059294 + https://www.openwall.com/lists/oss-security/2022/03/15/3 +Notes: + carnil> As of 2022-03-14 the Red Hat bugzilla entry contains a "TODO + carnil> add link to patch when public" marking but not yet references + carnil> to upstream fixes, but claims to be introduced in commit + carnil> f185de28d9ae ("mld: add new workqueues for process mld + carnil> events"). The fix seems to be 2d3916f31891 ("ipv6: fix skb + carnil> drops in igmp6_event_query() and igmp6_event_report()"), which + carnil> is applied in 5.17-rc7. + carnil> For 5.16.y the issue is fixed in 5.16.13. +Bugs: +upstream: released (5.17-rc7) [2d3916f3189172d5c69d33065c3c21119fe539fc] +5.10-upstream-stable: N/A "Vulnerable code not present" +4.19-upstream-stable: N/A "Vulnerable code not present" +4.9-upstream-stable: N/A "Vulnerable code not present" +sid: released (5.16.14-1) +5.10-bullseye-security: N/A "Vulnerable code not present" +4.19-buster-security: N/A "Vulnerable code not present" +4.9-stretch-security: N/A "Vulnerable code not present" |